Cryptography and Steganography
Wired
“Bin
Laden: Steganography Master?”
http://www.wired.com/news/politics/0,1283,41658,00.html
Wired
“Secret Messages Come in .Wavs”
http://www.wired.com/news/print/0,1294,41861,00.html
ABC
News
“A Secret Language: Hijackers May Have Used Secret Internet Messaging
Techniques”
Types of Codes Being Used in the Hacker Subculture
http://members.aol.com/nova1337/tutorial.htm
Solving the PhreakNIC v3.0 Code
Solution to the PhreakNIC Code
Messages
in Images
(Polar Bear in a Snowstorm)
Messages
in Images
http://steganography.tripod.com/stego/software.html
JPHide
http://linux01.gwdg.de/~alatham/stego.html
Ways that terrorists could use steganography
The Three D’s of Defeating Steganography
Ways to Defeat Steganography - Detection
Ways to Defeat Steganography – Detection
Ways to Defeat Steganography - Detection
Outguess and Stegdetect (www.outguess.org)
Ways to Defeat Steganography - Decryption
Ways to Defeat Steganography - Decryption
Ways to Defeat Steganography - Decryption
Ways to Defeat Steganography – Deletion
Other Weaknesses of Steganography
Other Weaknesses of Steganography
Weaknesses of the Michigan Study
Weaknesses of the Michigan Study
There *Is* Steganography on the Web
ABC
News
http://www.citi.umich.edu/u/provos/stego/abc.html
The
Elonka Code
http://members.aol.com/elonka/elonkacode1.txt
Some Weblinks on Steganography
Some Weblinks on Steganography
Some Weblinks on Steganography