Chapter 5

Data Hiding Using Encryption Techniques

Abstract

In this chapter we will list different methods to conceal private data using encryption techniques. As discussed previously, steganography is considered a subbranch of cryptography, which is still considered the most secure method to transmit data in today's digital world.

We begin talking about anonymous operating systems and how we can use them to conceal our identity online using anonymous networks like TOR and I2P.

In the next section we cover disk encryption. This includes full disk encryption, operating system partition encryption, and single file encryption, creating encrypted vaults and encrypting our data before uploading it to the cloud. We also cover major attacks against encryption ...

Get Data Hiding Techniques in Windows OS now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.