LSB Modification Example
Introduction to Steganography
1 Bit from Message 1 File
1 Byte from Container 1 File
1 Byte toContainer 2 File
Aerial Reconnaisance Photo
*Commercial Software or Shareware
posting to bulletin board,
The Internet is the modern day
equivalent of the “dead drop”.
Example from Neil Johnsons’s http://www.jjtc.com/Steganography/
Third Example (LSB Modification)