Modern Steganography

Powerful Essays
Modern Steganography

Abstract
This paper introduces steganography, the art and science of hidden writing. The purpose of steganography is to hide the existence of a secret message from a third party. The most popular modern application of steganography involves concealing messages within least significant bits of image or sound files. Another application of modern steganography is a steganographic file system. Steganography is also used by some modern printers, where tiny yellow dots that contain encoded printer serial numbers, as well as other information, are added to each printed page.
I chose modern steganography as a topic for my course paper primarily because I have had an interest in the topic before, and would like to use this paper as an opportunity to expand my knowledge of steganographic techniques, especially in their modern applications.

Introduction
In this paper, we will introduce what steganography is and what kind of applications can be expected. Steganography is an art and science of hidding information within other information. The word itself comes from Greek and means ”hidden writting”. First complex book cover- ing steganography was written by Johannes Trithemius in 1499. The book Steganographia itself was published later in 1606 and immediately placed on the Index Librorum Prohibitorum.
In recent years cryptography become very popular science. As stega- nography has very close to cryptography and its applications, we can with advantage highlight the main differences. Cryptography is about conceal- ing the content of the message. At the same time encrypted data package is itself evidence of the existence of valuable information. Steganogra- phy goes a step further and makes the ciphertext invisible to unautho- rized users. Hereby we can de ne steganography as cryptography with the additional property that its output looks unobtrusively. Secret data | Unobtrusive media |
[k>>4]*2^k*257/8,s[j]=k^(k&k*2&34)



References: 1.G. J. Simmons. The prisoner 's problem and the subliminal channel. In Advances in Cryp- tology – CRYPTO '83”, 1983. 3.Niels Provos. Defending against statistical steganalysis. 2001. 4.Rakan El-Khalil and Angelos D. Keromytis. Hydan: Hiding information in program binaries. Technical report, Department of Computer Science, Columbia University, 2004. 5.Imre Csisz´ar. The method of types. IEEE TIT: IEEE Transactions on Information Theory, 44, 1998. 6.Christian Cachin. An information-theoretic model for steganography. Lecture Notes in Computer Science, 1525:306–318, 1998. 7.Luis von Ahn and Nicholas J. Hopper. Public-key steganography. In Lecture Notes in Computer Science, volume 3027 / 2004 of Advances in Cryptology - EUROCRYPT 2004, pages 323–341. Springer-Verlag Heidelberg, 2004. 8.R. Anderson, R. Needham, and A. Shamir. The steganographic le system. In IWIH: Inter- national Workshop on Information Hiding, 1998. 10.Miroslav Dobs´cek. Extended steganographic system. In 8th International Student Confer- ence on Electrical Engineering. FEE CTU, 2004. 11.Luis von Ahn, Nicholas J. Hopper, and John Langford. Provably secure steganography. 2002. Errata included.

You May Also Find These Documents Helpful

  • Good Essays

    Nt1310 Final Exam

    • 3599 Words
    • 15 Pages

    b. digital watermark (Incorrect. A digital watermark is used to identify proprietary data, but it does not protect privacy.)…

    • 3599 Words
    • 15 Pages
    Good Essays
  • Good Essays

    Dream Place

    • 722 Words
    • 3 Pages

    Our research focuses on designing watermarking schemes that can resist collusion attacks. One branch of our work aims to construct code based on abstract assumptions about the embedding layer.1 Another is embedding-focused and does not explore code structures.2 Our study shows that the code-based strategy has the advantage of low computational complexity, but the embedding-based scheme holds the benefit of high collusion resistance, which is measured by the number of colluders that can be caught within a certain probability of detection. We describe a design that considers both coding and embedding layers to…

    • 722 Words
    • 3 Pages
    Good Essays
  • Good Essays

    The most common methods of obfuscation are numeric variance, character scrambling, nulling, aggregating, encoding, artificial data generating, and repeating of the character masking process (Magnabosco, 2009). These methods rely on functions that exist in the SQL system server.…

    • 684 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Uptil now most of the work is done on image, video, audio.but today the Database watermarking becomes the research topic because of the increasing the use of relational database systems. Which deals with the legal issue of copyright protection of database systems. .Watermarking is an information hiding technique which is used to embed a mark within some host content. In this paper,we have focused on the review of four relational database watermarking techniques proposed by researchers [R.Agarwal & Jerry Kiernan, ZHU Qin, Brijesh B. Mehta, A.Odeh and A. Al-Haj].…

    • 3087 Words
    • 13 Pages
    Powerful Essays
  • Good Essays

    Week 3 Lab Assignment

    • 981 Words
    • 4 Pages

    Introduction To Codes, Ciphers, & Codebreaking. (2010, July 13). Retrieved from Vectorsite: Introduction To Codes, Ciphers, & Codebreaking…

    • 981 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    The Nsa and Gchq

    • 3038 Words
    • 13 Pages

    If you want to keep information secret, you have two possible strategies: hide the existence of the information, or make the information unintelligible. Cryptography is the art and science of keeping information secure from unintended audiences, of encrypting it. Conversely, cryptanalysis is the art and science of breaking encoded data. The branch of mathematics encompassing both cryptography and cryptanalysis is cryptology. This method of secrecy has existed since 1900 B.C. in the form of Egyptian hieroglyphs. Up to the present two organizations have come to the front of the field; United States ' National Security Agency (NSA) and United Kingdom 's Government Communications Headquarters (GCHQ). In order to understand these institutions in their current state one must know their origins.…

    • 3038 Words
    • 13 Pages
    Powerful Essays
  • Powerful Essays

    Wiles, Jack; (2007) Techno security 's guide to e-discovery and digital forensics, Elsevier, ISBN 159749223X.…

    • 1974 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    Coding: Questions

    • 2042 Words
    • 18 Pages

    Data hiding, which means that critical data stored inside the object is protected from code outside the object is accomplished in Java by…

    • 2042 Words
    • 18 Pages
    Good Essays
  • Powerful Essays

    Data Leakage Detection

    • 2271 Words
    • 10 Pages

    The distributor after sharing his sensitive data objects, which we consider here in form of file, discovers those objects at some unauthorized place. If…

    • 2271 Words
    • 10 Pages
    Powerful Essays
  • Powerful Essays

    The Secret Sharer Analysis

    • 1624 Words
    • 7 Pages

    Dilworth, Thomas. "Conrad 's The Secret Sharer." LINCCWeb SFX Services. N.p., n.d. Web. 02 Dec. 2012. <http://resolver.linccweb.org/FLCC1100?frbrVersion=2>.…

    • 1624 Words
    • 7 Pages
    Powerful Essays
  • Powerful Essays

    Robust Digital Image Watermarking Based on Gradient Vector Quantization and Denoising using Bilateral filter and its method noise ThresholdingI. Kullayamma, P. Sathyanarayana,…

    • 3433 Words
    • 12 Pages
    Powerful Essays
  • Powerful Essays

    including hiding data within: text, mpeg layer three and images. This paper also covers basic algorithm for…

    • 3592 Words
    • 18 Pages
    Powerful Essays
  • Better Essays

    Data Leakage Detection

    • 2743 Words
    • 11 Pages

    References: [1] P. Papadimitriou and H. Garcia-Molina, “Data leakage detection,” IEEE Transactions on Knowledge and Data Engineering, pages 51-63, volume 23, 2011. [2] S. Czerwinski, R. Fromm, and T. Hodes. Digital music distribution and audio watermarking. [3] L. Sweeney. Achieving k-anonymity privacy protection using generalization and suppression, 2002. [4] S. U. Nabar, B. Marthi, K. Kenthapadi, N. Mishra, and R. Motwani. Towards robustness in query auditing. In VLDB ’06.…

    • 2743 Words
    • 11 Pages
    Better Essays
  • Powerful Essays

    Jessica Codr, jmc5@cec.wustl.edu (A project report written under the guidance of Prof. Raj Jain) Download…

    • 10575 Words
    • 43 Pages
    Powerful Essays
  • Powerful Essays

    Steganography differs from cryptography in the sense that where cryptography focuses on keeping the contents of a message secret, steganography focuses on keeping the existence of a message secret. Steganography and cryptography are both ways to protect information fromun wanted parties but neither technology alone is perfect and can be compromised. Once the presence of hidden information is revealed or even suspected, the purpose of steganography is partly defeated. The strength of steganography can thus be amplified by combining it with cryptography.…

    • 1368 Words
    • 6 Pages
    Powerful Essays

Related Topics