Before we go into the depths and study what digital steganography is and what we can do with it, we must go back to the beginning of sealing.
The term waterproofing comes from the Greek words waterproof + writing, as the history of waterproofing dates back to the time of Da Vinci.
The purpose of sealing is to send a message that will be hidden inside a material or intangible object, in order to hide it.
The need to create seals was invented to serve mainly military purposes, as the country's spies had to communicate in complete secrecy and security, as they circulated sensitive files. Now, classical sealing has been overtaken and replaced by digital sealing.
The question is, is digital sealing a tool of defense and privacy or a Trojan Horse of malicious users?
Digital steganography: What is digital steganography?
Digital sealing is a data encryption technique in which some data is "hidden" behind other data to protect the sender's message.
Digital steganography: How does digital steganography work?
A message can be hidden behind any digital object, whether it is a text file (.txt, .docx) or an activation key.
The most common data transfer 'containers' used by stenographers are image files, audio files, videos, etc.
Modern waterproofing appeared in the world in 1985, with the evolution of personal computers.
Since then, the evolution of sealing has evolved very slowly, but steadily and surely, as now a message can be hidden:
- In the smaller Bits of large images
- Behind encrypted data or random data
- In audio file
- In video
- In texts (.txt, .docx files, in a sealing blog).
In most cases, the information is hidden in pixels and extracted with special tools.
To do this, modern seals often program specially coded codes.
The dangers of digital stenography
Digital steganography, as mentioned earlier, is just a series of methods that conceals information and can have many properties, such as Watermarks in photographs to prevent the theft of these images and ensure the protection of personal data.
One of the simplest ways to hide malware is to use duplicate extensions. A file will be named for example as "sea.jpg.exe".
When you click on it, Windows will only look at the last part of the extension and will therefore be treated as executable. For a computer without protection, this method is very effective, but fortunately now with antivirus, attacks have dropped dramatically.
As mentioned earlier, text can be embedded in images. This can take the form of malicious code.
Although it will not be able to harm you because your computer scans the files, there are several computers that avoid scanning the files and run it immediately after downloading it.