Method Name | Medium | Hiding/Encrypting Process | Unhiding/Decrypting Process | Description |
---|---|---|---|---|
1. LSB Substitution | Images | Use a tool like OpenPuff, Steghide, or ImageMagick to hide binary data by replacing LSBs. | Use the same tool to extract the hidden message from the stego image. | Replace the least significant bit (LSB) of each pixel with the message bit to be hidden, causing minimal visual changes. |
2. Text-Based Steganography | Text | Use a Python script to embed data within the text using encoding schemes (e.g., Base64). | Use the same script to extract the hidden data from the stego text. | Hide the message within the text by modifying certain characters or words based on encoding schemes. |
3. Audio LSB Modification | Audio | Utilize tools like DeepSound or StegHide to hide binary data by modifying the LSBs of audio samples. | Use the same tools to extract the hidden data from the stego audio. | Modify the least significant bit (LSB) of audio samples to embed the message, maintaining audio quality. |
4. Video LSB Modification | Video | Use FFmpeg or OpenPuff to hide data by altering the LSBs of video frames. | Employ FFmpeg or OpenPuff to extract the hidden data from the stego video. | Similar to audio LSB modification, but applied to video frames, allowing for higher capacity steganography. |
5. Spatial Domain Techniques | Images | Use LSB Matching or random pixel modification in tools like StegoMagic or OpenStego. | Use the same tools to recover the hidden data from the stego image. | Alter pixel values directly in the cover image to embed the message, achieving minimal visual changes. |
6. Transform Domain Techniques | Images | Utilize tools like OutGuess or StegHide to embed data in the frequency domain using DCT or DWT. | Use the same tools to extract the hidden data from the stego image. | Convert the image into the frequency domain using DCT or DWT and embed the message in specific coefficients for robustness. |
7. Visual Cryptography | Images | Use VSL (Visual Secret Sharing Scheme) tools like "vss" to divide the secret message into shares. | Use the same tool to combine the shares and reveal the original message. | Divide the secret message into shares or "layers" of binary data, and combining shares reveals the hidden message. |
8. Audio Spectrogram Steganography | Audio | Use Sonic Visualizer or StegSpect to embed data in the spectrogram of audio. | Use the same tools to extract the hidden data from the stego audio. | Convert audio to its spectrogram representation, and embed data in the spectrogram by modifying specific frequency ranges. |
9. Hide Data in File Metadata | Images/Audio/Video | Use ExifTool or FFmpeg to embed data in the metadata of media files. | Utilize the same tools to extract the hidden data from the metadata. | Embed the message within the metadata of media files without visibly affecting the media content. |
10. Image Color Modification | Images | Use stegano.py or OpenStego to modify the color channels of an image to hide data. | Use the same tools to extract the hidden data from the stego image. | Modify the color channels (RGB or HSV) to encode data, resulting in minor changes in the image appearance. |
11. Whitespace Steganography | Text | Use Python scripts or tools like Snow or BPCS-Steganography to encode data in whitespaces. | Use the same tools or scripts to extract the hidden data from the text. | Encode binary data within whitespaces in a text document, making it appear as regular text. |
12. Spread Spectrum Technique | Multimedia | Use Chirp Spread Spectrum modulation to spread the message across audio or image frequencies. | Implement the same technique to extract the spread message from the media. | Spread the message across the entire media file using frequency hopping or direct sequence spread spectrum. |
13. Text Steganography in DNS | Text | Use DNS TXT records to hide data by encoding it in subdomains or query strings. | Extract the hidden data from DNS TXT records using the same method. | Hide data by encoding it within DNS TXT records, leveraging subdomains or query strings. |
14. Steganography in IPv6 | Network | Utilize IPv6 headers' unused fields to hide data in network packets. | Extract the hidden data from the IPv6 headers of network packets. | Use unused fields in IPv6 headers to embed data within network packets, providing a covert communication channel. |
15. Steganography in TCP/UDP | Network | Utilize unused TCP/UDP header fields to hide data in network packets. | Extract the hidden data from the TCP/UDP headers of network packets. | Use unused fields in TCP/UDP headers to embed data within network packets, creating a covert communication channel. |
16. Invisible Ink Steganography | Text | Utilize lemon juice or other invisible inks on paper to write a hidden message. | Reveal the message by heating the paper or using UV light to make the ink visible. | Write the hidden message using invisible ink, which becomes visible when subjected to specific conditions. |
17. Hide Data in Font Styles | Text | Embed data by varying font styles (size, weight, italic, etc.) or using whitespace between characters. | Extract the hidden data by analyzing font variations and whitespace. | Encode data by modifying font styles or using specific whitespace patterns in the text, allowing the hidden message to blend with the visible text. |
18. Chaffing and Winnowing | Text | Split the message into packets, then intersperse real and fake packets before sending. | Receive the packets, extract the real ones |
, and discard the fake packets. | Intersperse real data packets with fake ones during transmission, where the receiver discards the fake packets and reassembles the original message from the real packets. | | 19. Steganography in Punctuation | Text | Encode data within punctuation marks, such as commas, periods, or exclamation marks. | Extract the hidden data by analyzing the pattern of punctuation marks. | Hide data by altering the use or frequency of punctuation marks, allowing the hidden message to be hidden in plain sight within the text. | | 20. Barcode Steganography | Images | Use barcode-generating tools to encode data in barcodes on images. | Use barcode readers or decoder tools to extract the hidden data from the image. | Encode data in the form of barcodes, which can be read by barcode readers or decoding tools. |