This commit is contained in:
Miloslav Ciz 2024-09-02 20:43:40 +02:00
parent 3f374a4713
commit 89ddec4212
18 changed files with 1861 additions and 1823 deletions

View file

@ -12,7 +12,7 @@ Some notable methods and practices of steganography include:
- Embedding in **images**. One of the simplest methods is storing data in least significant bits of pixel values (which won't be noticeable by human eyes). Advanced methods may e.g. modify statistical properties of the image such as its color [histogram](histogram.md).
- Embedding in **sound**, **video**, vector graphics and all other kinds of media is possible.
- All kinds of data can be embedded given enough storage capacity of given bearing medium (e.g. it is possible to store an image in text, sound in another sound etc.).
- Information that's present but normally random or unimportant can be used for embedding, e.g. the specific order of items in a list (its [permutation](premutation.md)) can bear information as well as length of time delays in timed data, amount of noise in data etc.
- Information that's present but normally random or unimportant can be used for embedding, e.g. the specific order of items in a list (its [permutation](permutation.md)) can bear information as well as length of time delays in timed data, amount of noise in data etc.
The following two pictures encode text, each picture a different one, written under it. (The method used for the encoding as well as the whole code will be present further below.)