SkyDogCON 2013: Cutting-Edge Data Hiding & Steganography Techniques by Michael Raggo π
Discover the latest methods in data hiding and steganography showcased at SkyDogCON 2013. Learn how these techniques are used in corporate espionage, covert communication, and digital evidence.

SkyDogCon
2.2K views β’ Dec 15, 2013

About this video
DATA HIDING AND STEGANOGRAPHY: A PEEK AT THE LATEST TECHNIQUES
If the newswire is any indication, corporate espionage, covert communications, and evidence concealment continue to plague corporations, investigators, and the military. Use of data hiding techniques by Russian Spies for covert communications, Operation Shady RAT and Alureon corporate espionage trojans, and German evidence of steganography used by Al Qaeda, are the latest in a series of incidents involving data hiding.
This presentation will highlight some of the latest research of the 21st century involving data hiding techniques over the network and with data-at-rest. The highlights will demonstrate new techniques for hiding data on mobile devices, operating systems, VOIP, virtual images, social networks, and other dominating technologies in today's world.
Having demonstrated the latest data hiding techniques, detailed analytical methods for discovering hidden data, as well as jamming methods for disrupting data hiding operations will be outlined. We will then consider emerging technologies and attack methods, including cloud considerations, parallel processing attack methods, privacy protection, and derivative data hiding and detection theories.
If the newswire is any indication, corporate espionage, covert communications, and evidence concealment continue to plague corporations, investigators, and the military. Use of data hiding techniques by Russian Spies for covert communications, Operation Shady RAT and Alureon corporate espionage trojans, and German evidence of steganography used by Al Qaeda, are the latest in a series of incidents involving data hiding.
This presentation will highlight some of the latest research of the 21st century involving data hiding techniques over the network and with data-at-rest. The highlights will demonstrate new techniques for hiding data on mobile devices, operating systems, VOIP, virtual images, social networks, and other dominating technologies in today's world.
Having demonstrated the latest data hiding techniques, detailed analytical methods for discovering hidden data, as well as jamming methods for disrupting data hiding operations will be outlined. We will then consider emerging technologies and attack methods, including cloud considerations, parallel processing attack methods, privacy protection, and derivative data hiding and detection theories.
Tags and Topics
Browse our collection to discover more content in these categories.
Video Information
Views
2.2K
Likes
10
Duration
46:14
Published
Dec 15, 2013
User Reviews
4.0
(2) Related Trending Topics
LIVE TRENDSRelated trending topics. Click any trend to explore more videos.