logo
Defence blues
Steganography notes
  • Red wilds
  • Privacy greenhouse
  • Purple crossroads
  • Indigo observatory
  • Contact
Initializing search
    • Golem Trust Computing Ltd.
    • Department of Silent Stability
    • The Home for Bewildered Beasts of Legend
    • Stormforge training grounds
    • Honeytech for humans
    • Blue team @Purpleteaming
      • In the beginning …
      • Middle ground
        • Persistence
        • Buffer overflows
        • Reverse engineering
        • Steganography
          • Steganography notes
            • ML-based steganalysis
            • Detecting AI-generated steganography
            • Network and behavioural detection
            • Problems and challenges
          • Steganography notes
            • ML-based steganalysis
            • Detecting AI-generated steganography
            • Network and behavioural detection
            • Problems and challenges
          • Runbooks
          • Root-me steganography challenges
        • Cryptanalysis
        • Evasion
      • End of story
    • Blue team @SOC
    • Blue team for dev
    • Blue team @Home
    • Bulletproofing servers

    Steganography notes¶

    How steganographic techniques work, how modern AI-based methods change the detection problem, and what network and behavioural signals remain reliable when file-level analysis fails.

    Notes

    • ML-based steganalysis
    • Detecting AI-generated steganography
    • Network and behavioural detection
    • Problems and challenges
    2026-03-25 20:00
    © Copyright 2025, TyMyrddin.
    Created using Sphinx 7.2.6. and Sphinx-Immaterial

    Made with love in the Unseen University, 2025, with a forest garden fostered by /ut7