CYB 402: Steganography: Access Methods and Data Hiding

 

 

Learning Outcomes
At the end of this course, students should be able to:
1. discuss secret writing and different methods and tools used for each;
2. identify why steganography is important, and how it is different from cryptography and
encryption;
3. describe the uses and applications of steganography, and how to use steganography
methods and work with any of the steganography types and techniques;
4. practice the different steganography techniques for encrypting the data and use data
hiding methods, techniques and access methods;
5. develop the information-hiding systems, steganography algorithm and security of a
steganographic algorithm;
6. analyse how to detect steganography, finding images, and verifying hidden content; and
7. organise practical experimentation of data hiding tools, investigation techniques and the
latest countermeasures.

Course Contents
History of secret writing. An overview of steganography. Introduction to steganography –
Definition of steganography. Why is steganography important? Steganography vs. Encryption.
Uses of steganography. Problem of steganography. Steganography applications and methods.
Steganography types and methods – text steganography, images steganography, video and
audio steganography. Steganography techniques. Survey of different steganography
techniques for encrypting the data. Information hiding: steganography and steganalysis. Data
hiding methods, techniques and access methods. Requirements for data hiding.
Steganography and Business – the basics of embedding, different aspects in informationhiding systems. Steganographic algorithm. Security of a steganographic algorithm.
Steganography detection, finding images, and verifying hidden content. Research and
practical experimentation of data hiding tools. Research on investigation techniques and the
latest countermeasures.

Lab work: Practice secret writing using different methods and tools. Learn how to use
steganography methods and techniques for encrypting the data. Master data hiding methods,
techniques and access methods using case study exercises. Write samples steganography
algorithm and secure the algorithm. Detect elements of steganography, finding images, and
verifying hidden content in a given text, image, audio and video samples.