An Overview of Steganography and Presentation of Associated Java Application

Powerful Essays
Topics: Steganography
Unseen: An Overview of Steganography and Presentation of Associated Java Application C-Hide

Unseen: An Overview of Steganography and Presentation of Associated Java Application C-Hide
Jessica Codr, jmc5@cec.wustl.edu (A project report written under the guidance of Prof. Raj Jain) Download

ABSTRACT:
People have desired to keep certain sensitive communications secret for thousands of years. In our new age of digital media and internet communications, this need often seems even more pressing. This paper presents general information about steganography, the art of data hiding. The paper provides an overview of steganography, general forms of steganography, specific steganographic methods, and recent developments in the field. The information presented in this paper is also applied to a program developed by the author, and some sample runs of the program are presented.

KEYWORDS: steganography, steganalysis, data hiding, data security, data embedding, stego-objects, watermarking, secret communications, secret messages, hidden messages, hidden channel, covert channel, LSB alterations

TABLE OF CONTENTS:
1. Introduction and Overview 1. Steganography Versus Cryptology 2. Characteristics of Strong Steganography 3. Origins of Steganography 2. Cover Media and General Steganography Techniques 1. Digital Media 2. Text 3. Network Communications 3. Specific Steganographic Tactics 1. Least Significant Bit Alterations 2. Transform Domain Techniques 3. Data Dispersal and Feature Modification Techniques 4. Non-Image Techniques 4. Cutting-Edge Developments 1. Novel View of Steganography 2. Advances with JPEGs 3. Advances with Networks 4. Steganalysis and Artificial Intelligence 5. Other Recent Developments

http://www.cse.wustl.edu/~jain/cse571-09/ftp/stegano/index.html

1 of 21

Unseen: An Overview of Steganography and Presentation of Associated Java Application C-Hide

5. Author's Application and Conclusions 1. My Application: Description 2. My Application:

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Steganography

    • 527 Words
    • 6 Pages

    STEGANOGRAPHY IN VIDEOS SONAM GUMBER 1156357 OVERVIEW oIntroduction to Core Java oSteganography Defined oVideo Steganography oExamples in History oSteganography with Cryptography oDigital Approaches oReasons For Using Digital Videos oFlow work of video steganography oComparison b/w original and modified video oAdvantages INTRODUCTION TO CORE JAVA Java is a general-purpose, concurrent, classbased, object-oriented computer programming language that is specifically designed to have as few implementation…

    • 527 Words
    • 6 Pages
    Satisfactory Essays
  • Powerful Essays

    Steganography

    • 1427 Words
    • 6 Pages

    INTRODUCION Steganography is the art of concealing private or sensitive information within a carrier that for all intents and purposes, appears innocuous. It comes from the Greek words steganós (covered) and graptos (writing). Simply put, if you were to view the presented information, it would appear to be something that does not warrant further analysis due to the fact that it does not LOOK or SOUND like anything that contains sensitive information. Steganography has been used for hundreds of years…

    • 1427 Words
    • 6 Pages
    Powerful Essays
  • Better Essays

    Steganography

    • 928 Words
    • 4 Pages

    Steganography Introduction to Steganography Codes have been around for centuries ranging from wax, invisible ink, Morse code, the Enigma used by the Germans during World War II and now steganographic. Steganography is the latest form to insidiously hide information over the Internet without a trace of a file being altered. You are able to hide messages within images, voice or music. Steganography is an ancient method of hiding messages. Today messages are hidden in images and music. Steganography…

    • 928 Words
    • 4 Pages
    Better Essays
  • Good Essays

    Steganography

    • 277 Words
    • 2 Pages

    matching upper and lower bounds on the maximum rate of any secure stegosystem. We introduce the concept of steganographic key exchange and public-key steganography, and show that provably secure protocols for these objectives exist under a variety of standard number-theoretic assumptions. We consider several notions of active attacks against steganography, show how to achieve each under standard assumptions, and consider the relationships between these notions. Finally, we extend the concept of steganograpy…

    • 277 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Steganography

    • 2046 Words
    • 9 Pages

    SteganoGRAPHY documentation 1. Introduction 1.1 Purpose This SDS describes the various functions of our project. The actual design of the various modules and components of Student Information System is described in this document which takes care of various functionalities that our project aims to achieve and for determining the operating characteristics of the system. 1.2 Intended Audience and Reading Suggestions This SDS document is intended for any developers, project manager or documentation…

    • 2046 Words
    • 9 Pages
    Powerful Essays
  • Powerful Essays

    Steganography

    • 1450 Words
    • 6 Pages

    Pursuing M.Tech, Banasthali University, Banasthali ABSTRACT Cryptography is the art of securing information by applying encryption and decryption on transmission data which ensure that the secret can be understood only by the right person.[1] Steganography is the process of sharing information in an undetectable way by making sure that nobody else can even detect the presence of a secret. If these two methods could be combined, it would provide a fool-proof security to information being communicated…

    • 1450 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    Modern Steganography

    • 1774 Words
    • 8 Pages

    Abstract This paper introduces steganography, the art and science of hidden writing. The purpose of steganography is to hide the existence of a secret message from a third party. The most popular modern application of steganography involves concealing messages within least significant bits of image or sound files. Another application of modern steganography is a steganographic file system. Steganography is also used by some modern printers, where tiny yellow dots that contain encoded printer…

    • 1774 Words
    • 8 Pages
    Powerful Essays
  • Satisfactory Essays

    Programme: BTEC Higher National Diploma (HND) in Computing H2 Unit Number and Title: Unit 41: Programming in Java Assignment Ref. Number: 41.1- Sample programming using JAVA applications. Module Tutor: Murshed Thakur Email: murshed.edu@gmail.com/g.murshed@theiet.org Date Set: Learner's Name: …… …………………………. Learner's ID: ………………………………… Date handed-in: ….:……………… Plagiarism Statement I declare that, apart from properly referenced quotations, this report is my own work and…

    • 2145 Words
    • 9 Pages
    Satisfactory Essays
  • Powerful Essays

    Required 23 6. Code Snippets 24 7. Screen Shots 28 8. Testing 35 9. Conclusion 38 10. Bibliography 39 2. PROJECT DESCRIPTION What Is Steganography? Steganography applications conceal information in other, seemingly innocent media. Steganographic results may masquerade as other file for data types, be concealed within various media, or even hidden in network traffic or disk space. We are only limited…

    • 2269 Words
    • 10 Pages
    Powerful Essays
  • Satisfactory Essays

    Steganography

    • 32606 Words
    • 131 Pages

    APPLE Support offers drivers, technical support and other resources online. APPLE support is customized to meet customer’s needs. Its best known software prodocts are APPLE MAC Operating systems, APPLE office, office suite and Internet Explorer web browser. APPLE cell phone like MS1, marketed as a flexible, mid-sized and mid-range computer for people who do not need a technical powerhouse nor a computer that skimps on basic common features. APPLE longterm objectives are modify cellphone design…

    • 32606 Words
    • 131 Pages
    Satisfactory Essays