Steganography

Powerful Essays
Topics: Steganography
INTRODUCION
Steganography is the art of concealing private or sensitive information within a carrier that for all intents and purposes, appears innocuous. It comes from the Greek words steganós (covered) and graptos (writing). Simply put, if you were to view the presented information, it would appear to be something that does not warrant further analysis due to the fact that it does not LOOK or SOUND like anything that contains sensitive information. Steganography has been used for hundreds of years as a means of concealing information from prying eyes before ultimately reaching its intended destination. Examples of its use in history are detailed in the following section The History of Steganography. It relies on the sender and receiver agreeing upon the method by which the information will be hidden and therefore some means of prior communication is essential for steganography to be of any use. Steganography is sometimes confused with cryptography. Although the two can co-exist as discussed later in this document, they are not the same. Both are used to protect information but steganography is concerned with concealing information thereby making it unseen while cryptography is concerned with encrypting information thereby making it unreadable.
Review
Steganography relies on the fact that the human senses are inadequate when compared to analysis performed by machines or even in fact the senses of other animals of the earth. The human eye or the human ear cannot detect very subtle or minute changes in visual or aural presentations making steganography an effective means of concealing private information. One major factor in steganography is that it relies on the fact that a person does not know that a picture or a sound file or a block of text actually contains hidden information. It is a much more effective means of protecting information if the attacker (unintended or unauthorized recipient of information) does not know that the material presented before them



References: 1. Kipper, Greg “Investigator’s Guide to Steganography” Auerbach Publications, 2004 2. Fridrich, Goljan, Du. “Reliable Detection of LSB Steganography in Color and Grayscale Images” http://www.ws.binghamton.edu/fridrich/Research/acmwrkshp_version.pdf 3. Zollner, Federrath, Klimant, Pfitzmann, Piotraschke, Westfeld, Wicke, Wolf. “Modelling the security of steganographic systems” Paper presented at the 2nd Workshop on Information Hiding – April 1998, Portland. 4. Cole, Eric. “Book Excerpt: Hiding in Plain Sight” Published on Computerworld August 4th 2003. http://www.computerworld.com/printthis/2003/0,4814,83714,00.html 5. SpyHunter “Steganography & Steganalysis” Presentation made at Infosec 2004 Conference 6. Petitcolas, Fabian Anderson, Ross J Kuhn, Markus. Attacks on copyright marking systems, in David Aucsmith (Ed), “Information Hiding – A Survey”, Second International Workshop, IH’98, Portland, Oregon, U.S.A., April 15-17, 1998, Proceedings, LNCS 1525, Springer-Verlag, ISBN 3-540-65386-4, pp. 219- 239. And Fabien A. P. Petitcolas. Watermarking schemes evaluation. I.E.E.E. Signal Processing, vol. 17, no. 5, pp. 58–64, September 2000.

You May Also Find These Documents Helpful

  • Better Essays

    Steganography

    • 928 Words
    • 4 Pages

    Steganography Introduction to Steganography Codes have been around for centuries ranging from wax, invisible ink, Morse code, the Enigma used by the Germans during World War II and now steganographic. Steganography is the latest form to insidiously hide information over the Internet without a trace of a file being altered. You are able to hide messages within images, voice or music. Steganography is an ancient method of hiding messages. Today messages are hidden in images and music. Steganography…

    • 928 Words
    • 4 Pages
    Better Essays
  • Powerful Essays

    Steganography

    • 2046 Words
    • 9 Pages

    SteganoGRAPHY documentation 1. Introduction 1.1 Purpose This SDS describes the various functions of our project. The actual design of the various modules and components of Student Information System is described in this document which takes care of various functionalities that our project aims to achieve and for determining the operating characteristics of the system. 1.2 Intended Audience and Reading Suggestions This SDS document is intended for any developers, project manager or documentation…

    • 2046 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    Steganography

    • 277 Words
    • 2 Pages

    matching upper and lower bounds on the maximum rate of any secure stegosystem. We introduce the concept of steganographic key exchange and public-key steganography, and show that provably secure protocols for these objectives exist under a variety of standard number-theoretic assumptions. We consider several notions of active attacks against steganography, show how to achieve each under standard assumptions, and consider the relationships between these notions. Finally, we extend the concept of steganograpy…

    • 277 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Steganography

    • 1450 Words
    • 6 Pages

    Pursuing M.Tech, Banasthali University, Banasthali ABSTRACT Cryptography is the art of securing information by applying encryption and decryption on transmission data which ensure that the secret can be understood only by the right person.[1] Steganography is the process of sharing information in an undetectable way by making sure that nobody else can even detect the presence of a secret. If these two methods could be combined, it would provide a fool-proof security to information being communicated…

    • 1450 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    Steganography

    • 527 Words
    • 6 Pages

    STEGANOGRAPHY IN VIDEOS SONAM GUMBER 1156357 OVERVIEW oIntroduction to Core Java oSteganography Defined oVideo Steganography oExamples in History oSteganography with Cryptography oDigital Approaches oReasons For Using Digital Videos oFlow work of video steganography oComparison b/w original and modified video oAdvantages INTRODUCTION TO CORE JAVA Java is a general-purpose, concurrent, classbased, object-oriented computer programming language that is specifically designed to have as few implementation…

    • 527 Words
    • 6 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Steganography

    • 32606 Words
    • 131 Pages

    APPLE Support offers drivers, technical support and other resources online. APPLE support is customized to meet customer’s needs. Its best known software prodocts are APPLE MAC Operating systems, APPLE office, office suite and Internet Explorer web browser. APPLE cell phone like MS1, marketed as a flexible, mid-sized and mid-range computer for people who do not need a technical powerhouse nor a computer that skimps on basic common features. APPLE longterm objectives are modify cellphone design…

    • 32606 Words
    • 131 Pages
    Satisfactory Essays
  • Powerful Essays

    Modern Steganography

    • 1774 Words
    • 8 Pages

    Abstract This paper introduces steganography, the art and science of hidden writing. The purpose of steganography is to hide the existence of a secret message from a third party. The most popular modern application of steganography involves concealing messages within least significant bits of image or sound files. Another application of modern steganography is a steganographic file system. Steganography is also used by some modern printers, where tiny yellow dots that contain encoded printer…

    • 1774 Words
    • 8 Pages
    Powerful Essays
  • Powerful Essays

    What is Steganography?

    • 3206 Words
    • 13 Pages

    A Genetic algorithm based crypt-steganography technique for message hiding in JPEG images Aleem Ali*, Sherin Zafarb, Reshmi Philip a) M.Tech Scholar, Jamia Hamdard(Hamdard University), Hamdard Nager, N.D-110062 b) F/O Engg, University Polytechnic, JMI, New Delhi-110025 Email: aleem08software@gmail.com, sherin_zafar84@yahoo.com, reshmiphilip@gmail.com Running Head: A Genetic algorithm based crypt-steganography technique for message hiding in JPEG images *To whom correspondence…

    • 3206 Words
    • 13 Pages
    Powerful Essays
  • Powerful Essays

    Required 23 6. Code Snippets 24 7. Screen Shots 28 8. Testing 35 9. Conclusion 38 10. Bibliography 39 2. PROJECT DESCRIPTION What Is Steganography? Steganography applications conceal information in other, seemingly innocent media. Steganographic results may masquerade as other file for data types, be concealed within various media, or even hidden in network traffic or disk space. We are only limited…

    • 2269 Words
    • 10 Pages
    Powerful Essays
  • Powerful Essays

    Modern Steganography

    • 2063 Words
    • 9 Pages

    Modern Steganography Abstract This paper introduces steganography, the art and science of hidden writing. The purpose of steganography is to hide the existence of a secret message from a third party. The most popular modern application of steganography involves concealing messages within least significant bits of image or sound files. Another application of modern steganography is a steganographic file system. Steganography is also used by some modern printers, where tiny yellow dots…

    • 2063 Words
    • 9 Pages
    Powerful Essays