|
|
|
|
•There are a wide range of methods used to identify which redundant
bits from a cover-medium you want to use.
|
|
•These methods usually make up what could be compared to the algorithm
component in cryptography and include methods like
|
|
•Using all of them
|
|
•Using a key or bit mask for selection
|
|
•Random distribution or complex formulas, and
|
|
•Selection based on cover-image analysis which is usually done in an
attempt to thwart Steganalysis.
|
|
•I’m not going to cover the various methods of identifying which
redundant bits to use to embed a message because it could most likely fill an
entire hour by itself.
|