About kt919

This author has not yet filled in any details.
So far kt919 has created 1 blog entries.

Steganography in data recovery

 

Steganography is the world’s famous way of hiding data. It is a very smart technique which is complicated to identify in the first place. It does not involve any encryption method to hide data but uses very simple logic. The term Steganography is a Greek word that means “concealing or protecting” and on the other hand graph relates to writing.

The idea of Steganography was from the historical period dating back to 400 BC, which was used by a king to intimate another country about an attack that was to be carried out. It was written on his servants head and he has his hair grown after that and then was shaved to have the message communicated. This was the base for the term to come into existence. Ever since then there has been so many instances of steganography being observed.

The main involvement of steganography in digital world was after the rise in computer users. There were lot of needs to highly secure and transmit any information so that it could not be used or decoded by someone else. This technique is also used by negatively by individuals that send illegal information or data.

In this technique the data that is intended to be sent across is either inserted in the form of an image, can be in a video or sometimes in a jumbled way that it’s hard to notice. Let us consider an example.
We can see that there are four numbers that are hidden in the particular image. And by passing the lights that relate to the colors we are able to identify them separately.

  • There are situations where data is hidden in the audio file. It tends to sound like an echo but later but can be picked up only by concentrating. It is unnoticed most of the times.
  • The speed of the video file can help determine if any image is hidden in it. It slows down when it is noted.
  • Jumbling and scrabbling is the basic format carried out where, the words or the data is mixed up and is located by the receiver.
  • Data is sent in the form of packets, which sometimes can be delayed and delivered to identify better.
  • The main technique used is in the example given above. The data is hidden with the same background, so it tends to appear there is no text. It is the concept of invisible ink.
  • Radio waves can help hide data which can later be concerted and data is obtained.
  • There can be files like word files or excel files that are hidden under an image.

Even though there are so many techniques that are used to hide data, the main problems that are faced by data recovery experts are trying to identify the method of hiding the data. It takes years of practice to be an expert in these scenarios and most importantly needs a lot of concentration without which it is possible to miss important points.

CONTACT US

PHONE: 22 297 70 40
PHONE2: 731 153 969


ADDRESS: Dzielna 7A (MAP)
E-MAIL: info@iviter.pl


Call us and discuss your case, you don’t have to approach us for recuperation – however, we will readily check what should be possible for your situation. We welcome you for a free analysis and assessment of conceivable recovery.


The telephone is open 24 hours a day. Also on holidays and Sundays. Email or Call. We can help!

Steganography in data recovery 2018-07-26T16:32:50+00:00