Preview

Cryptography with Steganography

Powerful Essays
Open Document
Open Document
2269 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Cryptography with Steganography
Contents
CONTENTS PAGE NO.

1. Acknowledgement 3
2. Project Description 4
3. Analysis and Requirement Specification 5
4. Software Design Specification
i. Execution Sequence 19 ii. Data Flow Diagram 22
5. Software and Hardware Required 23
6. Code Snippets 24
7. Screen Shots 28
8. Testing 35
9. Conclusion 38
10. Bibliography 39

2. PROJECT DESCRIPTION

What Is Steganography?

Steganography applications conceal information in other, seemingly innocent media. Steganographic results may masquerade as other file for data types, be concealed within various media, or even hidden in network traffic or disk space. We are only limited by our imagination in the many ways information and data can be exploited to conceal additional information.

For many years Information Hiding has captured the imagination of researchers. Digital watermarking and steganography techniques are used to address digital rights management, protect information, and conceal secrets. Information hiding techniques provide an interesting challenge for digital forensic investigations. Information can easily traverse through firewalls undetected. Research into steganalysis techniques aids in the discovery of such hidden information as well as leads research toward improved methods for hiding information.

Related research themes include: anonymous communications, anonymous online transactions, covert channels in computer systems, covert/subliminal communications, detection of hidden information (steganalysis), digital forensics, information hiding aspects of privacy, steganography, subliminal channels in cryptographic protocols, watermarking for protection of intellectual property, and other applications

Steganography is a complex subject, please note that although it involves hiding messages, it is not cryptography. The

You May Also Find These Documents Helpful

  • Better Essays

    Along with this new approach to spying, a new approach to the system of passing messages was introduced as well. The punishment for accused spies, especially spies with evidence, was unavoidable. Suspected spies were hung without question, spies with evidence were walking death traps. New measures needed to be taken in order to protect the spies. Advances in anything from coded messages and fake identities to invisible ink were now being utilized to insure the spy’s safety.…

    • 1287 Words
    • 6 Pages
    Better Essays
  • Powerful Essays

    Nt1310 Unit 7 Vocab Answers

    • 4516 Words
    • 19 Pages

    Steganography is task of hiding information by putting messages within one another. Whereas, cryptography is when you change information into an illegible layout. this format is called cipher text.…

    • 4516 Words
    • 19 Pages
    Powerful Essays
  • Good Essays

    Nt1310 Final Exam

    • 3599 Words
    • 15 Pages

    b. digital watermark (Incorrect. A digital watermark is used to identify proprietary data, but it does not protect privacy.)…

    • 3599 Words
    • 15 Pages
    Good Essays
  • Good Essays

    Fraud Examination

    • 387 Words
    • 2 Pages

    Review 3-6: The first method used to conceal larceny occurring at point of sale is thefts from other registers. It involves simply taking from someone else's register. The next method is death by a thousand cuts. Death by a thousand cuts is stealing currency in very small amounts over an extended period of time. The third method is reversing transactions. This is done by reversing transactions such as false voids or refunds. This will cause the register tape to reconcile to the amount of cash on hand after the theft. The fourth method used to conceal larceny at point of sale is altering cash counts or cash register tapes. This is done by altering the cash counts from the register to match the total receipts reflected on the register tape, or instead of altering cash counts, manually altering the register tapes. The last method that is used to conceal larceny at point of sale is to destroy the register tapes. By not being able to make the cash and the tape balance, the best thing to do is destroy the register tape to prevent others from discovering the imbalance.…

    • 387 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Testbacksecurity

    • 2284 Words
    • 10 Pages

    A number of technical mechanisms—digital watermarks and embedded code, copyright codes, and even the intentional placement of bad sectors on software media—have been used to enforce copyright laws.…

    • 2284 Words
    • 10 Pages
    Good Essays
  • Powerful Essays

    Identity theft has ruined the lives of many. It is crucial and necessary to educate more professionals in the computer forensic field to combat this and many other cybercrimes. The following paper will help inform about identity theft and to explain how it can be resolved through digital forensics. What is identity theft? The U.S. Department of Justice defines it as when “someone wrongfully obtains and uses another person 's personal data in some way that involves fraud or deception, typically for economic gain.” There are many ways to do this. One way is when dumpster divers spend time looking through trash in…

    • 1160 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    Because the wide world of technology has developed at such an astounding pace, there are many problems for victims as well as investigators of cyber crime and computer-related crimes. First, we must familiarize ourselves with the definitions of cyber crime and computer-related crime. For this paper, we will define cyber crime as the use of a computer as a tool to commit a crime or as a crime committed where a computer is the target. We will define computer-related crime as a traditional crime where a computer is used to carry out, record actions, or provide evidence of a crime. The beginnings of the problem of investigating cyber crime come in the form of reporting. For many reasons cyber crimes tend to go unreported or severely underreported. Another problem is that law enforcement officials (as well as parents and their children) do not have adequate training, allocation of funds, coordination with other agencies, or proper understanding of applicable laws that pertain to cyber crime. From all angles cyber crime is a difficult problem to tackle, and there is a definite need for law enforcement to catch up with the technology of cyber space, which is quickly becoming a feeding ground for illegal and illicit activity.…

    • 1568 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    (justice.gov, 2008) Other forms of crime fighting techniques are used by the FBI, with the use of Cyber-crime spyware that is placed into the computer of a suspect without detection and monitors what they do and catches them red handed if they commit a crime via the internet. A good example of this type of program is called the Computer and Internet Address Verifier (CIPAV) and has been used by the FBI since 2004. (Begun, D. A. 2009) An ingenious way of catching criminals who commit cybercrimes, this program has stopped thousands of criminals lurking on the internet. It is known that some crime scene evidence can also be linked to other crime scenes through the use of DNA databases. If a man were to be convicted for sexual abuse or sexual assault, he is to provide a sample of his DNA at the time of his conviction, when the sample would be placed into the database and that data would be compared and he would be convicted. (justice.gov, 2008) In the long run, DNA…

    • 415 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Steganalysis is the art of detecting and breaking steganography (Kessler, 2001). One such program is StegDetect, created by Niels Provos. This program will only detect data in JPG files, making it extremely limited (Steganography, 2001). There is also a website that can help detect isolated examples at www.guillermito2.net. With so many programs available to use to hide data, it makes it extremely difficult to detect the hidden data. The first step in steganography detection is to have suspicion that there is even a hidden message in the data at all. Next you need to find the right software to find the hidden message. And finally knowing the encryption algorithm used in the first place. As you can see, steganalysis is not an easy task.…

    • 789 Words
    • 4 Pages
    Better Essays
  • Good Essays

    To cover up such an inconceivable thing would be almost impossible, though an attempt to erase such a scarcely credible act of callousness would be vital to avoid facing repercussions of wrong doing.…

    • 355 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Laudon Mis 6ce Ch11

    • 11152 Words
    • 56 Pages

    4) Once they are discovered, documents, patterns, and expert rules must be hidden so they can be retrieved and used by employees.…

    • 11152 Words
    • 56 Pages
    Satisfactory Essays
  • Powerful Essays

    Modern Steganography

    • 2063 Words
    • 9 Pages

    In recent years cryptography become very popular science. As stega- nography has very close to cryptography and its applications, we can with advantage highlight the main differences. Cryptography is about conceal- ing the content of the message. At the same time encrypted data package is itself evidence of the existence of valuable information. Steganogra- phy goes a step further and makes the ciphertext invisible to unautho- rized users. Hereby we can de ne steganography as cryptography with the additional property that its output looks unobtrusively.…

    • 2063 Words
    • 9 Pages
    Powerful Essays
  • Satisfactory Essays

    Computer Misuse Act

    • 311 Words
    • 2 Pages

    Copying and illegally transferring data using online computers and large storage devices (hard disks, memory sticks, DVDs) personal data, company research and written work ( novels, textbooks)…

    • 311 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    References: [1] D. Kundur and D. Hatzinakos, “Digital watermarking for telltaletamper proofing and authentication,” Proc. IEEE, vol. 87, no. 7, pp.1167–1180, Jul. 1999.…

    • 3433 Words
    • 12 Pages
    Powerful Essays
  • Good Essays

    Lock Tool

    • 564 Words
    • 3 Pages

    It’s important to note that this will not actually conceal your data from somebody that knows what they are doing.…

    • 564 Words
    • 3 Pages
    Good Essays