New: steganographyAll contenthive-129948krhive-196917zzanhive-183959hive-185836hive-180932steemhive-166405hive-144064hive-150122hive-101145uncommonlabhive-188619hive-184714hive-145157hive-183397bitcoinkrsuccesshive-180301hive-193637lifehive-103599hive-139150motivationTrendingNewHotLikerszalewski (39)in crypto • 3 months agosteemCreated with Sketch.About SteganographySteganography is a method of hiding information within another object, such as text, images, audio, or video. Unlike cryptography, where data is encrypted to make it unreadable without a key…manuelhooks (71)in cryptanalysis • 7 months agoA Pinch of SteganographySteganography Steganography is an advanced form of cryptography with its main aim being to hide a message and also hide the fact that there is a hidden message. This is often achived by…manuelhooks (71)in hive-139765 • 7 months agoThe making of a Word Search PuzzleA simple Word Search Puzzle Making a Word Search Puzzle. A Word Search Puzzle is an absolute blast, and real fun. Not only will it challenge your brain and boost up your vocabulary…neexal (36)in steganography • last yearUnveiling the Art of Steganography: Hidden Messages in the Digital AgeIn a world entrenched in digital communication, the art of concealing information within plain sight has gained significance. Steganography, an ancient technique with modern applications, stands as…shortcut (70)in art • 5 years agoTIL: How to tokenize a VOX file by using steganographyDear friends, as you might know, I'm quite active in the #cryptoart community. Since I discovered the possibility to tokenize my art using blockchain technology and convert it into rare…teamhumble (74)in steemhunt • 5 years agodeepsound - DeepSound is a steganography tool and audio converterdeepsound DeepSound is a steganography tool and audio converter Screenshots Hunter's comment DeepSound might be used as copyright marking software for wave, flac, wma, ape, and audio…hack-tha-world (58)in encryption • 5 years agosteemCreated with Sketch.How to Hide Secret Data In Audio or Photo Files Windows/Linux(PersSec103)Today we're going to learn some nifty tricks to keep the government and prying eyes out of our data. Though we've learned some very important fundamentals there are still holes in our security so…loucostello42 (25)in satoshistreasure • 6 years agoKey #006: The Earth KeyHow many decryptions does it take to get to the center of the Russian Nesting Doll? The Earth Key was release on May 12th and the race was on to keep track of the various feeds and information from…liberteddy (25)in blockchain • 6 years agoHide crypto keys inside your girlfriend!You can keep crypto keys on any place, but what about hiding? What about an idea that encrypted keys for wallets of Bitcoin, EOS, BitShares, Steem or Whaleshares can be placed to a photo of your…steemitplease (25)in encryption • 6 years agosteemCreated with Sketch.Hash Reference For File Experiment IPFSThis post is just an experiment to publish some hashes that I will reference later on other sites and using IPFS: Below are the references to four files that have been hashed using the SHA3…lucasmw (44)in steemhunt • 7 years agoThe Hider - A Mac OS app to hide files inside your photosThe Hider A Mac OS app to hide files inside your photos Screenshots Hunter's comment The Hider uses the newest techniques in steganography and cryptography to secure…securitynews (26)in steganography • 7 years agoToolsmith - GSE Edition: Image Steganography & StegExposeThis is an adaptation for Steemit of HolisticInfoSec . if you want to have it in HTML format you can see it here . Cross-posted on the Internet Storm Center Diary. Updated with contest…lwflouisa (26)in cryptography • 7 years agoSteganography Isn't Going AwaySecurity through obscurity, often quoted yet so little understood. Repeated from the mouths of those who worship the echo chamber of tech giants. This despite the fact that throughout most of US…lwflouisa (26)in music • 7 years agoFound a website that turns poetry to musical ciphers,Recently Bruce Schneier was discussing how to conceal encrypted messages in a blog post, he goes on further to link the article that explores the concept of musical steganography even further:…npna (33)in openbsd • 7 years agoOpenBSD, OpenPGP, Bob and Alice but also a little bit of magic.In this catch from viaggi di nozze the Italian iconic actors Carlo Verdone and Claudia Gerini listening to some good heavy metal remember the most special situation where they…jeremiahams (47)in cryptocurrency • 7 years agoCryptography and SteganographyThe word steganography literally means “covered writing”. It is a combination of the Ancient Greek words “steganos” and “graphein” meaning covered, concealed, or protected and “writing” respectively…jclohanx (33)in security • 7 years agoSecurity part 1 - SteganographySTEGONOGRAPHY What is it? -According to wikipedia steganography "is concerned with concealing the fact that a secret message is being sent as well as concealing the contents of the message."…j1337 (52)in puzzle • 7 years agoPuzzle Time [ Mariana's Web 1337] -BeginAccessing URL Request: LION777 -Start [Connecting to LION-CUBE MAINFRAME...] [Connecting to 1337 Deep Web Puzzle...] [Encrypting Data....] [Bypassing Security...] [Finding Levels]…ronaldmcatee (52)in computer • 7 years agoSteganography ====> The Art of Hiding information in PhotosDo you know that you can hide information inside an Image? and deliver it to other people. without letting others knowing that you are delivering a secret message inside that photo. So this…jgr33nwood (47)in bitcoin • 7 years agoSteganography and Cybercriminals: Hidden in Plain SightJust three years ago the Google splash image for the day looked just like the normal google logo to the masses, but buried inside the image file itself were the companies Q2 projections, which were…