Stenography Essay

1476 words - 6 pages

INTRO
The growing popularity of the Internet and multimedia methods have sparked an ever increasing interest in hiding data [with] in digital media (Wang). Many of the methods that have been used to protect copyrighted materials such as audio, video, images, and text, have focused primarily on watermarking. However embedding data within data has also proved useful for concealed communication, or stegonagraphy. This paper will address in further detail what stegonagraphy is, and the various techniques that are utilized.

BASIC UNDERSTANDING
Stegonagraphy is a form of hidden communication that literally means covered writing (Niklasson). The message itself is left in plain view for all to see, but goes unnoticed because the very existence of there even being a message is secret. One popular expression used to describe this method is hidden in plain sight, experts refer to this as Security through Obscurity (Duraiswamy). This is of course in distinction to cryptography where the message is actually scrambled, and the data left virtually unintelligible (encryption) to the eavesdropper even though the existence of a message is often times known beforehand.
It is also important to note that watermarking and stegonagraphy differ as well. Stegonagraphic information must never be evident to a viewer unaware of its presence. Modern stegonagraphy should only be detectable if secret information is known i.e. a secret key, whereas this key feature is optional when referring to watermarking.
Also compared to watermarking, stegonagraphy has drawn less attention until recently, as computer specialists, signal-processing researchers, and multimedia product vendors concerned about information security have recognized that illicit use of the technique might become a threat to the security of the worldwide information infrastructure (Wang).This key piece of information has prompted research to study steganalysis, or the detection of embedded data.
Many times throughout history encrypted messages have been intercepted but not decoded. While this protects the hidden information from being discerned by the enemy, an intercepted message also alerts the enemy that someone is trying to communicate with someone else. Stegonagraphy on the other hand, takes the opposite approach and attempts to hide all evidence that communication is even taking place. Images are the most popular cover media for stegonagraphy and can be stored in a straightforward bitmap format such as BMP or in a compressed format such as JPEG(Kipper). As described above this is achieved through hiding a message within another message but doing s it in such a way that the compound message appears to be a normal graphic, video, or sound file. Some of the popular techniques that implement stegonagraphy such as microdots, semagrams, anamorphosis and invisible ink are described below:
MICRODOTS
One implementation of stegonagraphy is the microdot. The microdot is a page-sized photograph that has been...

Find Another Essay On Stenography

Beethoven’s Musical Reality Essay

1392 words - 6 pages .’ “When the boy became a man he even went so far in his revolt against visible notation that he would sometimes play the piano part of one of his own concertos from a few leaves sparsely scrawled over in a sort of private musical stenography” (Schauffler). This is the first hint of personal events impacting the style of Beethoven’s music. Others that lived on the Bonngasse included the Salomons, the father, which played fiddle for the opera

Eddie Carbone in Arthur Miller's A View From The Bridge

2247 words - 9 pages on her stenography which maybe indicates him thinking about how he tried to talk her into staying at school, but failed as the job at that time seemed all that Catherine had wanted. Now Catherine was more interested about spending time with Rodolfo. At this point in time the viewers could be thinking Eddie is paranoid. At a later stage in the play the audience sees Beatrice giving advice to Catherine. Previous to this scene Catherine has

Operation Auxin - Child Pornography

1982 words - 8 pages to abuse, to transfer and create child pornography and to profit.In recent years child pornography is increasingly being created by and distributed through electronic means via the Internet.Encryption is more and more common such as stenography, so even when messages or pictures are intercepted, it is nearly impossible to judge its legal/ illegal character. (MAKO 2005)Defences to Child PornographyIn regards to defences to child pornography, the

The Genre of Stoker's Dracula

9602 words - 38 pages stenography to write down their experiences; Van Helsing writes his in the traditional way, while his grammatical mistakes are a part of the text in order to emphasize the fact that he is a foreigner; Dr. Seward uses the phonograph and later on Mina uses a typing machine to record all these notes. Dracula is only `heard′ and `seen′ through these entries, we only learn about him from these diary notes, he never writes

Changes in Technology Since Sept 11

2837 words - 11 pages . ``There is more of an awareness that we're all in this together,'' said Thieme. ''They're much more realistic. They've lost their dream'' (Stakes). As a result, hackers who formerly acted out of boredom or to seek a challenge are now directing their energy into hacking for political purposes. For example, there is more research into protecting secrecy on the Web. Such technologies include digital drop boxes and stenography, which is the science of

When the Bubble Burst

1539 words - 6 pages By the time I arrived state side from my second tour in the Middle East the housing bubble had already burst. I noticed a drastic change in the way that many of my friends and family were living. Several of my friends that worked in real estate had sold their boats and seconds houses. My own stock portfolio had lost a third of its value. My sister and her husband had defaulted on their home mortgage leaving them scrambling for a place to live. I

phase diagram

4456 words - 18 pages Introduction: Chemical equilibrium is a crucial topic in Chemistry. To represent and model equilibrium, the thermodynamic concept of Free energy is usually used. For a multi-component system the Gibbs free energy is a function of Pressure, Temperature and quantity (mass, moles) of each component. If one of these parameters is changed, a state change to a more energetically favorable state will occur. This state has the lowest free energy

Revolutionary Work of Art

1890 words - 8 pages Walter Benjamin emphasizes in his essay, “The Work of Art in the Age of its Technological Reproducibility” that technology used to make an artwork has changed the way it was received, and its “aura”. Aura represents the originality and authenticity of a work of art that has not been reproduced. The Sistine Chapel in the Vatican is an example of a work that has been and truly a beacon of art. It has brought a benefit and enlightenment to the art

Enlightenment Thought in New Zealand Schools

1594 words - 6 pages In this essay I will be looking at how the political and intellectual ideas of the enlightenment have shaped New Zealand Education. I will also be discussing the perennial tension of local control versus central control of education, and how this has been affected by the political and intellectual ideas of the enlightenment. The enlightenment was an intellectual movement, which beginnings of were marked by the Glorious Revolution in Britain

Psychological Egoism Theory

2240 words - 9 pages The theory of psychological egoism is indeed plausible. The meaning of plausible in the context of this paper refers to the validity or the conceivability of the theory in question, to explain the nature and motivation of human behavior (Hinman, 2007). Human actions are motivated by the satisfaction obtained after completing a task that they are involved in. For example, Mother Teresa was satisfied by her benevolent actions and

How Celtic Folkore has Influenced My Family

1587 words - 6 pages Every family has a unique background that influences the way they live and interact with other people. My parents, who emigrated from Ireland to the States with my three brothers in 1989, brought over their own Celtic folklore and traditions that have helped shaped the way our family operates and lives. One aspect of folklore that has helped shape my family dynamic is the Celtic cross—both its background and what role it has played in our lives

Similar Essays

Computer Security Essay

3255 words - 13 pages way to protect the data being transmitted is to hide the message. There are two fundamental techniques used in computer security: Stenography and Cryptography. Both techniques require a transformation in the information to be sent, an identification character included in the message to recognize the sender, and also some secret information to scramble the message when sent and to unscramble it when received (Stallings 12). When the method of

Cuban Revolution Essay

718 words - 3 pages repercussions of what took place in the event that would reshape the island of Cuba from what it was before the revolution. In 1921 Batista joined the army as a private. During his time in the army, he learned how to type and write in shorthand. Two years later in 1923, he briefly left the army and became a teacher of stenography. Soon after he joined the rural police force and then transferred back into the army as a corporal and becoming the

Abraham J Briloff And Accounting Essay

1052 words - 4 pages United States from Russia. He graduated from the business school at the City College of New York in 1937 then proceeded to teach book keeping and stenography in high school. He also made extra income by doing and reviewing tax returns for an average leveled accounting firm that later became known as Seidman and Seidman. In 1951, Briloff developed his own accounting firm, which received massive attention from the corporate societies and other

Marianne Moore's Life Essay

1767 words - 7 pages attended Metzger Institute through high school and then enrolled at Bryn Mawr College in 1905. At Bryn Mawr Moore she published poems in two of the school’s literary magazines: Tipyn O’Bob and the Lantern. She majored in history, law, and politics, and graduated in 1909. After graduating Moore took secretarial courses at Carlisle Commercial College and then taught bookkeeping, stenography, typing, commercial English, and law. [i