This course is a complement to our series on Becoming a Forensic Accountant and the focus of the course is on steganography techniques.

Steganography is the art and science of embedding secret messages in a cover message in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message.

The first use of steganography can be traced to 440 BC when ancient Greece, people wrote messages on wood and covered it with wax, that acted as a covering medium Romans used forms of Invisible Inks, to decipher those hidden messages light or heat were used. During World War II the Germans introduced microdots, which were complete documents, pictures, and plans reduced in size to the size of a dot and were attached to normal paperwork. Null Ciphers were also used to hide unencrypted secret messages in an innocent looking message. Given the amount of data being generated and transmitted electronically, it’s no surprise that numerous methods of protecting that data have evolved.

There are various types of steganography: Text Steganography - Hiding information inside the text files. This involves changing format of existing text, changing words in a text, generating random character sequences or using context-free grammars to generate readable texts. Image Steganography - Process of hiding text in an image without distorting the picture. Video Steganography - Technique to hide any kind of files into a cover video file. Audio Steganography - The secret message is embedded into an audio signal which alters the binary sequence of the corresponding audio file. Network Steganography - The process of utilizing active network protocols as carriers to transmit a covert message, undetectable by an uninformed party, from a host to its destination.

This session will review these methods and also discuss relevant software.

Learning Objectives
  • Explore and examine the concepts of steganography.
  • Discover and evaluate text steganography.
  • Identify and evaluate image steganography.
  • Explore and evaluate audio steganography.
  • Discover and evaluate video steganography.
Last updated/reviewed: March 23, 2024

Included In Certifications

This course is included in the following Certification Programs:

9 CoursesBecoming a Forensic Accountant Certification

  1. Introduction to Forensic Accounting
  2. Preparing to be a Forensic Accountant: Focus on Document Review and Handwriting Analysis
  3. Forensic and Fraud Interviewing Skills and Techniques
  4. Preparing to be a Forensic Accountant: Focus Digital Forensics
  5. Preparing to be a Forensic Accountant: Focus on Computer Forensics - Part 1
  6. Preparing to be a Forensic Accountant: Focus on Computer Forensics (Cryptology) - Part 2
  7. Preparing to be a Forensic Accountant: Focus on Computer Forensics (Steganography) Part 3
  8. Preparing to be a Forensic Accountant: Focus on Network Forensics
  9. Preparing to be a Forensic Accountant: Cloud Forensics
3 Reviews (10 ratings)

Reviews

5
Anonymous Author
Another very informative and interesting course from Lynn, it is very heavy on technicalities though. however, same is true for all the courses from this certification.

5
Member's Profile
Your explanations and examples simplify the process and helps to understand the intuitively.

5
Member's Profile
Good course material, and the course was well organized.

Prerequisites
Course Complexity: Foundational

No advanced preparation or prerequisites are required for this course.

Education Provider Information
Company: Illumeo, Inc., 75 East Santa Clara St., Suite 1215, San Jose, CA 95113
Contact: For more information regarding this course, including complaint and cancellation policies, please contact our offices at (408) 400- 3993 or send an e-mail to .
Instructor for this course
Course Syllabus
INTRODUCTION AND OVERVIEW
  Introduction to Focus on Computer Forensics (Steganography) Part 32:01
  What is Steganography9:42
  Text Steganography8:31
  Image Steganography17:20
  How to Image4:12
  Audio Steganography9:38
  Video Steganography17:41
  Detecting Steganography11:15
CONTINUOUS PLAY
  Focus on Computer Forensics (Steganography) Part 31:20:20
SUPPORTING MATERIAL
  Slides: Focus on Computer Forensics (Steganography) Part 3PDF
  Focus on Computer Forensics (Steganography) Part 3 Glossary/ IndexPDF
REVIEW AND TEST
  REVIEW QUESTIONSquiz
 FINAL EXAMexam