Black Hat USA Registration Black Hat USA Registration Black Hat USA Briefings Black Hat USA Briefings Black Hat USA Training Black Hat USA Training Black Hat USA Schedule Black Hat USA Schedule Black Hat USA Sponsors Black Hat USA Sponsors Black Hat  USA Special Events Black Hat  USA Special Events Black Hat USA Venue Black Hat USA Venue

On This Page

Introduction to More Advanced Steganography

John A. Ortiz | July 27-28



Ends May 31



Ends July 24



Ends July 30


Tired of the NSA reading your personal emails? Want to keep pictures of your ex on your computer? Need to exfiltrate data innocuously? Then this Steganography course is for you!

We will explore steganography well beyond the common Least Significant Bit techniques. Want to learn about jpeg hiding? We do it several ways. Advanced audio? We do the wave with you. Executables, video, and bitmaps too. We'll learn about and apply steganalysis to demonstrate detection as well. Most of the techniques have DEMOs and source code, so you can dig into the details yourself.

This course introduces you to basic data hiding terminology and concepts, advancing to showcase more advanced steganographic techniques, some with very high data hiding capacities. One technique successfully hides in a jpeg with a typical capacity of 15 to 20%! That equates to an 8 MB jpeg image containing up to 1.6 MB of covert data! Another advanced technique boasts a 50% capacity in a bitmap with minimal perception – we'll try it out. I will present several audio and video hiding techniques with source code for hands-on student exercises. Less conventional is hiding in executable code and visual cryptography. Finally, we'll discuss and explore specific steganalysis techniques and concepts and apply them to the data hiding programs.

Scattered throughout the course are working demonstrations (most with source code) and hands-on experiments of several steganographic software programs - YOU can decide the effectiveness for yourself. Can you see it? Can you hear it? We shall see … or not!

Minimum Requirements To Take Course:

What Students Should Bring


John Ortiz is currently a senior reverse/exploit engineer for Crucial Security Inc., a wholly owned subsidiary of Harris Corporation working in the San Antonio based Air Force 90th Information Operations Squadron. In this position, he develops defensive tools to protect the Air Force's internal networks and researches novel techniques to solve practical cyber security problems. Included are autonomous network traffic analysis, malware analysis, security testing and forensics. Prior to working at Crucial, he spent 5 years at SRA International and 5 years at General Dynamics developing various defense related software, researching data hiding techniques, and analyzing malware.

Mr. Ortiz teaches at the University of Texas at San Antonio for the Computer Science and Electrical and Computer Engineering Departments. He teaches a broad spectrum of courses including microcomputers, microelectronic circuits, solid-state device physics, C++ and Data Structures, and steganography. Additionally, Mr. Ortiz specifically developed the Steganography course for the UTSA. It covers a broad spectrum of data hiding techniques in both the spatial and transform domains including least significant bit, discrete cosine transform, echo hiding, hiding in executables, and hiding in network protocols. Additionally, Mr. Ortiz developed several steganographic programs for testing and analysis.

Prior to working in the private sector, Mr. Ortiz served in the U.S. Air Force for 12 years as a communications officer. In this role he developed and maintained database software, managed various Air Force missions, and taught a 7-week network course.

Mr. Ortiz holds two master's degrees from the Air Force Institute of Technology, the first in Electrical Engineering and the second in Computer Engineering, with a BSEE from Rose-Hulman Institute of Technology.