Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo
Artwork

Content provided by HPR Volunteer and Hacker Public Radio. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by HPR Volunteer and Hacker Public Radio or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://staging.podcastplayer.com/legal.
Player FM - Podcast App
Go offline with the Player FM app!

HPR4394: Digital Steganography Intro

 
Share
 

Manage episode 486910763 series 108988
Content provided by HPR Volunteer and Hacker Public Radio. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by HPR Volunteer and Hacker Public Radio or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://staging.podcastplayer.com/legal.

This show has been flagged as Clean by the host.

Apologies for not introducing myself in the audio! I struggled a bit to take on this topic at a high enough level to keep it to about a half hour, because every subtopic is nuanced and the details are always technical.

Not sure how well it worked out but my intention was to focus mainly on the 2 most common examples - hiding messages in text and in images.

Topics I mentioned:

  • encryption vs steganography
  • who uses steganography and for what purpose?
  • hiding text in text
  • hiding data in images using LSB encoding
  • hiding data in other places
  • steganalysis

If you want to leave feedback, consider saying whether you think it would be more useful to talk about:

  • using the most popular tools and software
  • detailed look at specific steganographic techniques
  • case studies

in the unlikely case that I do a followup episode (I doubt there's a strong interest in this topic)

Provide feedback on this episode.

  continue reading

4410 episodes

Artwork
iconShare
 
Manage episode 486910763 series 108988
Content provided by HPR Volunteer and Hacker Public Radio. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by HPR Volunteer and Hacker Public Radio or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://staging.podcastplayer.com/legal.

This show has been flagged as Clean by the host.

Apologies for not introducing myself in the audio! I struggled a bit to take on this topic at a high enough level to keep it to about a half hour, because every subtopic is nuanced and the details are always technical.

Not sure how well it worked out but my intention was to focus mainly on the 2 most common examples - hiding messages in text and in images.

Topics I mentioned:

  • encryption vs steganography
  • who uses steganography and for what purpose?
  • hiding text in text
  • hiding data in images using LSB encoding
  • hiding data in other places
  • steganalysis

If you want to leave feedback, consider saying whether you think it would be more useful to talk about:

  • using the most popular tools and software
  • detailed look at specific steganographic techniques
  • case studies

in the unlikely case that I do a followup episode (I doubt there's a strong interest in this topic)

Provide feedback on this episode.

  continue reading

4410 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play