Schrecht

Schrecht t1_jbccdli wrote

Interesting. I feel like there must be a way to inject what looks like normal noise and perturb it in ways that look look natural but carry a signal. But you sound like your professor knew his shit. Thanks, it's something to think about.

1

Schrecht t1_jbbowfd wrote

Interesting. But it sounds like you're saying that the vulnerability is limited to some forms. Are there forms of steganography which lack that vulnerability?

2

Schrecht t1_jb9jssl wrote

>If you're altering a source file (by adding information, as in this example), it's detectable

Technically true. For steganography, detection requires a copy of the original. If you create your own content and keep no copy after inserting the message, the bad guys don't have the original.

13