Preview

Steganography Research Paper

Better Essays
Open Document
Open Document
789 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Steganography Research Paper
Steganography: The Modern Day Invisible Ink
Liza Bowlin
CINT 106
Professor Carole Bachmann
Ivy Tech Community College of Indiana

As a child, were you intrigued by the idea of sending a secret message to your best friend? Perhaps you were fascinated by the thought of using an invisible ink pen. If so, then I suggest learning about steganography. According to the online Free Merriam-Webster Dictionary, the definition of steganography is the art or practice of concealing a message, image, or file within another message, image, or file (Merriam-Webster, 2011). People can use many different techniques for steganography, using it for a variety of reasons. Steganography has been used for many years in forms such
…show more content…
Governments may want to use it to for covert missions. They can let their troops in a different area know what the next move should be in a war. Criminals might also use steganography. Some people think that steganography may have been a tool used by the people that planned the attacks on 9-11. Also, some people think there may have been hidden messages in the videos that were circulating that Osama bin Laden appeared in (Kessler, 2001). Appallingly, child pornographers may use steganography to hide files. A positive use for steganography would be for artists and photographers who want to make sure their copyrighted materials do not get stolen is to add a watermark to their …show more content…
Steganalysis is the art of detecting and breaking steganography (Kessler, 2001). One such program is StegDetect, created by Niels Provos. This program will only detect data in JPG files, making it extremely limited (Steganography, 2001). There is also a website that can help detect isolated examples at www.guillermito2.net. With so many programs available to use to hide data, it makes it extremely difficult to detect the hidden data. The first step in steganography detection is to have suspicion that there is even a hidden message in the data at all. Next you need to find the right software to find the hidden message. And finally knowing the encryption algorithm used in the first place. As you can see, steganalysis is not an easy task.
The increase in the use of computers has made it extremely easy to send a secret message. Much easier than finding someone who will let you shave their head and tattoo their scalp! With so many options to hide a message, let us just hope that more people use it for the right reasons, rather than the wrong

You May Also Find These Documents Helpful

  • Good Essays

    In 1892, Francisca Rojas was found with intense neck injuries while her two sons were found with their throats cut open and dead. Francisca Rojas fanatically accused her neighbor who, under extreme interrogation, would not confess of committing murder and injuring Rojas’s neck. Inspector Alvarez, the head of the case, went to the crime scene and found a bloody fingerprint next to where the boys laid. After comparing the fingerprint to those of the neighbor, mother, sons, and other suspects, Alvarez deduced that it matched the mother’s right thumbprint. She then confessed to the murdering of her sons. The discovery of the print saved an innocent neighbor from harsh punishment. Fingerprints help solve crimes and save people's lives everyday. For that reason, it is important for people to understand fingerprints significance.…

    • 1226 Words
    • 5 Pages
    Good Essays
  • Good Essays

    There are many ways and methods by which a programmer can hide his code that is developed for commercial or personal use. .NET applications have a high cost and are susceptible to attacks by on unethical traders integrate market as stakes run high in hacking these codes. Thus, .NET Obfuscators play a vital role in protecting these programs. The Merriam-Webster dictionary defines Obfuscation as: to make obscure <obfuscate the issue>: confuse <obfuscate the reader>: To be evasive, unclear, or confusing. It also means to confuse or bewilder.…

    • 793 Words
    • 4 Pages
    Good Essays
  • Good Essays

    20110616163506944

    • 1634 Words
    • 8 Pages

    Confidential or sensitive messages should be sent using a fast communication channel such as e-mail or instant messaging.…

    • 1634 Words
    • 8 Pages
    Good Essays
  • Better Essays

    Text messaging- This feature enables you to send and receive text style messages, just like you would do on a mobile phone.…

    • 1360 Words
    • 4 Pages
    Better Essays
  • Good Essays

    Masks have held countless uses and meanings throughout history. Masks have been used in plays, like those of Shakespeare, traditional dances, social gatherings, even as a form of casual or corporal punishment. Although masks have several different uses in different cultural situations, the meaning of the masks is generally the same. Masks are used to conceal an appearance and assume the identity of another. Metaphorically, masks can be used to hide feelings, to protect oneself, and to block out the outside world. Many of these examples are shown in Art Speigelman 's Maus.…

    • 1127 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    This can be illustrated by the process of Steganography and encryption using the operating system functions. Steganography is a method of hiding the presence of a message or a file inside another much larger file or message without the forensics knowing it is there in the first place (Westphal, 2003). It is a deliberate act of keeping a message or data hidden. One good example would be hiding pornographic images inside an image…

    • 257 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    1. Upon doing my own research, since I do not know anything about encryption, Ibelieve the technique used in encrypting this specific telegram is substitution. I came to this reasoning because transposition involves the positioning of the letters/numbers, such as columnar positioning and includes a more complicated order; steganography is when a hidden message is part of something else, like an image, article, in a list or other form of language. Stenography is intended to not attract attention to the message itself. The specific telegram we are looking at obviously looks coded and is not covert at all, that is how I ruled out stenography. I ruled out transposition because our telegram’s codes are positioned as if each set of numbers is a word. Then the signature at the end definitely leads me to believe it is the format of a letter.…

    • 287 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Text messaging, also referred to as SMS messaging, is a popular form of mediated, interpersonal communication that involves sending short messages to and from individual’s cell phones through a or cellular connection to converse with individuals at anyplace and anytime all over the world. Created in 1992 by Neil Papworth, an engineer for Vodaphone, a software company in England, the first text message was sent by Papworth to an executive of the company attending a Christmas party in a separate building; the message of the first ever text message simply read, “Merry Christmas”, it wouldn’t be until the next year that texting would be available to the general public (Peritz, 2012). So at mere 23 years old, Texting is one of the youngest mediums…

    • 1150 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Surveillance Paper

    • 844 Words
    • 4 Pages

    "When placed under constant scrutiny through surveillance, an individuals behaviour and relationships with others are likely affected. Its this notion that controls us the viewer to laugh at the many satires that produce Reality Television.…

    • 844 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Health Care Communication

    • 1854 Words
    • 8 Pages

    The advancement of technology has changed all areas of life as it is known in the United States. Health care is no exception to the ever-changing world. Communications between health care providers and patients and between providers within the health care community. E-mail communications have proven beneficial to both patients and health care providers. When used correctly, e-mail communication also offers security to patients in relation to their personal health information using encryption. E-mail is far form the only method of technologically advanced communications, and comparing and contrasting these differences will give further insight into the benefits of e-mail communication versus other forms of technology enhanced communication modalities.…

    • 1854 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    Technology Synthesis Essay

    • 1003 Words
    • 5 Pages

    As technology grows the ways of communicating continue to become more effective. We have the ability to communicate through cell phones and the internet. The advancement in technology has invented the way of texting on a cell phone or using the social media on the internet. Lynne Truss, the author of The Joy of Texting, gives a great example of what texting is by saying “texting is a supremely secretive medium of communication-its like passing a note…” Using the example of passing a note is a great way of interpreting a text because no one knows what the text says and it…

    • 1003 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    - Even though many of our messages are not verbalized, we nonetheless send messages to others-intentionally and sometimes unintentionally…

    • 2155 Words
    • 9 Pages
    Powerful Essays
  • Powerful Essays

    Government Secrecy

    • 1363 Words
    • 6 Pages

    The federal government has a long history of making information secret. The marking of documents to indicate their protected status, confidential or secret, began as an informal practice in the early days of the federal government. It was an exercise carried over from…

    • 1363 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Technologies Impact

    • 820 Words
    • 4 Pages

    Cell phones have not only made it easier for people to communicate on the run but they have brought back a more technologically advanced version of the classic letter writing, text messaging. The introduction of text messaging into the society has been one of the baffling technological successes of our age, according to Gopnik. “Take texting, surely the most baffling technological success of our age”. Texting has almost…

    • 820 Words
    • 4 Pages
    Good Essays
  • Good Essays

    i. to make it easier for the students to look for the meaning of unfamiliar words.…

    • 942 Words
    • 4 Pages
    Good Essays

Related Topics