
Steganography is a tool of great interest for different types of criminals, since it allows communication without being detected. To keep them safe, cryptography is enough. Those responsible for the security of companies and institutions do not need to hide their communications. PS: Who would benefit more from steganography: cybercriminals or security providers? Daniel LerchĭL: Without a doubt, cybercriminals. So steganography would be an additional layer of security. But their objectives are different: not everyone who needs to protect information, also needs to hide it. In fact, steganography usually uses cryptography to encrypt the message before hiding it. The two sciences are not mutually exclusive. While in cryptography the intention is that the message sent cannot be read by an attacker, in steganography the goal is to hide even the fact that any communication is taking place.
#Use of steganography in cyber espionage how to#
Panda Security: How would you define steganography? How is it different from cryptography?ĭaniel Lerch: Steganography studies how to hide information in a carrier object (an image, an audio file, a text or a network protocol). To analyze how to best handle this surreptitious threat, we spoke with Daniel Lerch, who has a PhD in Computer Science from the Universitat Oberta de Catalunya (UOC), and is one of the top steganography experts in Spain.


This is just one of the many steganography techniques used by hackers and cybercriminals to evade security systems.įrom the Greek steganos (hidden) and graphos (writing), steganography is a method of hiding data. However, the technique used by the fictional hacker protagonist of “Mr Robot” is far from being a TV whimsy.

Elliot Alderson hides secret information in audio CD files.
