Preview

Steganography

Good Essays
Open Document
Open Document
277 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Steganography
We give tightly matching upper and lower bounds on the maximum rate of any secure stegosystem. We introduce the concept of steganographic key exchange and public-key steganography, and show that provably secure protocols for these objectives exist under a variety of standard number-theoretic assumptions. We consider several notions of active attacks against steganography, show how to achieve each under standard assumptions, and consider the relationships between these notions. Finally, we extend the concept of steganograpy as covert communication to include the more general concept of covert computation.
Steganographic \protocols" have a long and intriguing history that goes back to antiquity. There are stories of secret messages written in invisible ink or hidden in love letters (the rst character of each sentence can be used to spell a secret, for instance).
More recently, steganography was used by prisoners, spies and soldiers during World
War II because mail was carefully inspected by both the Allied and Axis governments at the time [38]. Postal censors crossed out anything that looked like sensitive information
(e.g. long strings of digits), and they prosecuted individuals whose mail seemed suspicious. In many cases, censors even randomly deleted innocent-looking sentences or entire paragraphs in order to prevent secret messages from being delivered.
More recently there has been a great deal of interest in digital steganography, that is, in hiding secret messages in communications between computers.
The recent interest in digital steganography is fueled by the increased amount of communication which is mediated by computers and by the numerous potential commercial applications: hidden information could potentially be used to detect or limit the unauthorized propagation of the innocent-looking \carrier"

You May Also Find These Documents Helpful

  • Best Essays

    Works Cited

    • 363 Words
    • 2 Pages

    2. A book by Henry Goldman and Elizabeth Howard called Ancient Civilizations. It was published in Philadelphia by Gold House in 1989.…

    • 363 Words
    • 2 Pages
    Best Essays
  • Good Essays

    Kroisos Vs. Ka-Aper

    • 679 Words
    • 3 Pages

    many years later, some time around 530 BCE, as a grave marker for the deceased…

    • 679 Words
    • 3 Pages
    Good Essays
  • Good Essays

    during the Geometric Era. Not to mention, it was also used for votive offerings in…

    • 254 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Quiz 1 Bibl 104

    • 583 Words
    • 3 Pages

    | Until just after World War II the oldest OT manuscripts we had dated from about 200 B.C.Answer…

    • 583 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    Hidden in Plain View

    • 1031 Words
    • 5 Pages

    Slavery was an extended, often cruel, time in American history; it would take an all-out war before this evil institution was to be abolished. However, while in captivity, many slaves did not merely except their life in shackles. Instead, many fought back and even escaped, using various methods to do so, which Jacqueline L. Tobin documents in Hidden in Plain View. Tobin wrote this book to enlighten the reader to the various methods used to escape from bondage, using both direct and indirect sources, though, ultimately, giving the reader many questions left unanswered.…

    • 1031 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    MLA Worksheet 1

    • 428 Words
    • 3 Pages

    2. A book by Henry Goldman and Elizabeth Howard called Ancient Civilizations. It was published in Philadelphia by Gold House in 1989.…

    • 428 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    labor. It also had the initial philosophers and thought up of the way we now write literature.…

    • 588 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Symbols of depiction provide us with perhaps our most direct insight into the cognition of an individual or a society for pre-literate periods. Among literate communities, however, written words – those deceptively direct symbols used to describe the world – inevitably dominate the evidence. The locations and dates of the world’s earliest writing systems are summarized on the map below. Ancient literature in all its variety, from poems and plays to political statements and early historical writings, provides rich insights into…

    • 940 Words
    • 4 Pages
    Good Essays
  • Better Essays

    As a child, were you intrigued by the idea of sending a secret message to your best friend? Perhaps you were fascinated by the thought of using an invisible ink pen. If so, then I suggest learning about steganography. According to the online Free Merriam-Webster Dictionary, the definition of steganography is the art or practice of concealing a message, image, or file within another message, image, or file (Merriam-Webster, 2011). People can use many different techniques for steganography, using it for a variety of reasons. Steganography has been used for many years in forms such…

    • 789 Words
    • 4 Pages
    Better Essays
  • Good Essays

    exploited by the potential users in order to make valid use of this miracles network…

    • 1037 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    Modern Steganography

    • 2063 Words
    • 9 Pages

    References: 1.G. J. Simmons. The prisoner 's problem and the subliminal channel. In Advances in Cryp- tology – CRYPTO '83”, 1983.…

    • 2063 Words
    • 9 Pages
    Powerful Essays
  • Powerful Essays

    Censorship in the Media

    • 827 Words
    • 4 Pages

    Used by Governments or organisations to prevent the circulation of material. In wartime information about troop activities, future battle plans etc., will be censored. In peacetime censorship can be more problematic and controversial.…

    • 827 Words
    • 4 Pages
    Powerful Essays
  • Powerful Essays

    Speech Watermarking System

    • 3244 Words
    • 13 Pages

    Therefore, we can define watermarking systems as systems in which the hidden message is related to the host signal and non-watermarking systems in which the message is unrelated to the host signal. On the other hand,…

    • 3244 Words
    • 13 Pages
    Powerful Essays
  • Powerful Essays

    Audio Steganography

    • 5008 Words
    • 21 Pages

    Security is a complicated subject, which can be tackled by trained experts. As complexity increases, we need to understand the basics of security in a network world. We propose possibilities to develop adaptive steganographic techniques in general. Steganography refers to the practice of hiding secret message in communications over a public channel so that an eavesdropper cannot even tell that a secret message is being sent. The aim of this study was to investigate implement and evaluate a number of common methods of pixel-based Steganography. All the steganographic methods are based on the manipulation of LSB of pixel values or the rearrangement of colors to create LSB, which corresponds to the message being hidden. In addition to these, a technique such as putting your signature to the audio file will be used which provides a means to embed copyright and other information for identification and tracking.…

    • 5008 Words
    • 21 Pages
    Powerful Essays
  • Powerful Essays

    Lwod Char. Creation

    • 1354 Words
    • 6 Pages

    Background Limit: 5 (Generally 5, for some Background Types the limitation can be lower. For Specific Info, see "Available Background List")…

    • 1354 Words
    • 6 Pages
    Powerful Essays