Steganography Essay

2305 words - 9 pages

Computing Theory Assignment 3 Research Paper PAGE 2
SteganographySteganography ResearchAuthor:Hubert (0807R68878)Raymond Jonathan (0807R67731)Course: Computer ScienceSubject: Computing TheoryLecturer: Ms. Rohini BalapumiWhy Steganography:The authors find the art of Steganography is interesting and even might be very dangerous if used by secret organizations to pass their message online. The authors hope by doing the research of Steganography, more people will aware of the existence of steganography.IntroductionSteganography is the art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message, a form of security through obscurity. The word steganography is of Greek origin and means "concealed writing" from the Greek words steganos meaning "covered or protected", and graphein meaning "to write". The key concept behind steganography is that the message to be transmitted is not detectable to the casual eye. In fact, people who are not intended to be the recipients of the message should not even suspect that a hidden message exists.History of SteganographyThe first recorded uses of steganography can be traced back to 440 BC when Herodotus mentions two examples of steganography in The Histories of Herodotus . Demaratus sent a warning about a forthcoming attack to Greece by writing it directly on the wooden backing of a wax tablet before applying its beeswax surface. Wax tablets were in common use back then as reusable writing surfaces, sometimes used for shorthand.Another ancient example is that of Histiaeus, who shaved the head of his most trusted slave and tattooed a message on it. After his hair had grown the message was hidden. The purpose was to instigate a revolt against the Persians.The first recorded use of the term Steganography was in 1499 by Johannes Trithemius in his Steganographia , a treatise on cryptography and steganography disguised as a book on magic. Generally, messages will appear to be something else: images, articles, shopping lists, or some other covertext and, classically, the hidden message may be in invisible ink between the visible lines of a private letter.Overview and Steganography FunctionSteganography and Cryptography DifferencesThe difference between steganograpy and cryptography is that in cryptography, one can tell that a message has been encrypted, but he cannot decode the message without knowing the proper algorithm/key. In steganography, the message itself may not be difficult to decode, but most people would not detect the presence of the message. When combined, steganography and cryptography can provide two levels of security. Computer programs exists which encrypt a message using cryptography, and hide the encryption within an image using steganography.Advantages/Disadvantages of SteganographyThe advantage of steganography, over cryptography alone, is that messages do not attract attention to themselves. Plainly visible...

Find Another Essay On Steganography

Computer Crime Investigations Forensics Research Essay

546 words - 2 pages and purpose is, "basic categories of evidence established: live versus dead systems; logical versus physical analysis; the dispersal of evidence over networks; the complications from encryption, data fragmentation, steganography which refers to the practice of concealing a text message inside another file, usually a photograph, anonymity; the importance of procedures and protocols. Unlike some other pontificators about computer investigations

Electronic Toolkits and Investigating Windows Computers

2974 words - 12 pages encryption, data fragmentation, steganography which refers to the practice of concealing a text message inside another file, usually a photograph, anonymity; the importance of procedures and protocols. The victims are recognizes that the term "forensic" puts them in the legal arena, and the there are too many aspects of this technology for one person to master them all" (Casey, 2001)In a two-page report, identify the key elements of the US criminal

Investigators: Digital Evidence

1410 words - 6 pages types of symmetric and asymmetric encryption types and cracking them takes a very long time. There is also the use of steganography which hides messages inside of jpeg images. They are very hard to detect and almost impossible to recover. The only ways to notice steganography is by statistical data analysis and noticing changes in carrier files (Comp TIA Security +, 2009). Whatever tools are used must be properly tagged, actions logged and all

domains of an IT Infrustructure

983 words - 4 pages during this phase of the attack include steganography, the use of tunneling protocols, and altering log files.7 Domains of an IT-Infrastructure User DomainThe subjects:The people using the system.This is the domain of the AUPThreats/VulnerabilitiesLack of user awarenessUser apathy toward policiesSecurity policy violationsDisgruntled employee attacksSocial engineering attacksMitigation StrategiesWorkstation DomainUsually refers to the computer on

Computer Forensics

861 words - 3 pages wares neededThe Computer Crime Investigation Forensic Tools and Technology research and purpose is, "basic categories of evidence established: live versus dead systems; logical versus physical analysis; the dispersal of evidence over networks; the complications from encryption, data fragmentation, steganography which refers to the practice of concealing a text message inside another file, usually a photograph, anonymity; the importance of

Deconstructing Architecture Using EvenHookey

2158 words - 9 pages , "Empathic, knowledge-based models for e-business," in Proceedings of the Workshop on Constant-Time, Lossless Theory, Sept. 2005.[3]W. Jones, C. Zhao, and C. Leiserson, "Investigation of DNS," in Proceedings of WMSCI, Aug. 2005.[4]C. K. Wilson, "Probabilistic, Bayesian epistemologies for multi-processors," in Proceedings of SIGGRAPH, Apr. 2000.[5]J. Thomas, "The influence of homogeneous archetypes on steganography," Journal of Concurrent

The Next Great Wall

3060 words - 12 pages is faced with challenges. Manufacturers can use a loophole where products imported into China have until June of 2004 to support WAPI along with contracts signed before December 1, 2003.15 Domestic use of these products within China means anyone who gets a hold of them can use the technology WAPI free. Chinese authorities also have to contend with another developing technology with encryption – steganography. Steganography embeds messages in

Control of Internet Pornography

3504 words - 14 pages ., n.d. Web. 2 Jan. 2011. . Astrowsky, B. "STEGANOGRAPHY: Hidden Images, A New Challenge in the Fight Against Child Porn.”:: Anti-Child Porn Organization ::. N.p., n.d. Web. 2 Jan. 2011. "Steganography software." File Encryption Software - Hide files & folders. N.p., n.d. Web. 2 Jan. 2011.

Detection Measures

1423 words - 6 pages the desire for rights management systems.Sophisticated rights management systems is a combination of scrambling of data so that only authorized persons may handle it (cryptography) and putting hidden cues in the data so that is people make unauthorized use of it that use may be evidenced (steganography) can work to secure online copyright. An instance has been the alliance between IBM and Xerox. As a result an image could be put in IBM's

The Effect Of Decentralized Information On Programming Languages

1991 words - 8 pages Abstract The adaptive steganography approach to Byzantine fault tolerance is defined not only by the analysis of local-area networks, but also by the key need for the Internet [15]. In this work, we show the improvement of the transistor. In order to answer this problem, we prove that Smalltalk can be made random, scalable, and linear-time. Table of Contents 1) Introduction 2) Probabilistic Algorithms 3) Implementation 4) Results 4.1

The Image Watermarking System

2446 words - 10 pages knowledge of the signals’ statistics. Note that estimation does not require any knowledge of the key used for watermark embedding. REFERENCES [1] Ingemar J. Cox, Mathew L. Miller, Jeffrey A. Bloom, Jessica Fridrich, and Ton Kalker, Digital Watermarking and Steganography, Morgan Kaufmann Publishers, 2008. [2] David Kilburn. Dirty linen, dark secrets. Adweek, 1997. [3] A. M. Zeki and A. A. Manaf, A novel digital watermarking technique based

Similar Essays

Cryptography Essay

779 words - 3 pages combination of both cryptography and cryptanalysis. There is another field that is similar to these technologies that is called steganography. This is the process of hiding information so as to appear as not hidden at all. This technology is similar to cryptography in the sense that both are used to protect data from interception or prying eyes. Of late, the term information hiding relates to both watermarking and steganography. Watermarking is

Computer Forensics And Criminal Justice Essay

745 words - 3 pages , NY. Addison, WesleyKrebs, B. (2006). Rise of computer crime. Retrieved on June 12, 2007 from site: http://www.crime-research.org/news/28.09.2005/1517/Kessler, G (2001) "Steganography: Hiding Data within Data" Retrieved on June 21, 2007 from site: http://www.garykessler.net/library/steganography.htmlWestphal, K. (2003) "Steganography Revealed" Retrieved on June 21, 2007 from site: http://www.securityfocus.com/infocus/1684Clair, B (2001

"The Code Book" By Simon Singh

825 words - 3 pages The book starts by explaining steganography and cryptography. Steganography is the process of hiding a message, while cryptography is the process of hiding its meaning. Examples of both are given with information on how the codes are used, and how they were broken. The main example is Mary Queen of Scot's code, the weakness of which led to her execution.Later, the book moves onto stronger forms of encryption such as the Vigenere square and

History Of Cryptology Essay

966 words - 4 pages & Hall/CRC, 2005. Google Books. Google. Web. 20 Nov. 2013. • "steganography." The Free On-line Dictionary of Computing. Denis Howe. 20 Nov. 2013. . • "The Scytale Cipher." Enigma Group. Enigma Group, 10 May 2008. Web. 21 Nov. 2013. • "1900 BC." ThinkQuest. Oracle Foundation, n.d. Web. 20 Nov. 2013. .