Preview

Modern Steganography

Powerful Essays
Open Document
Open Document
2063 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Modern Steganography
Modern Steganography

Abstract
This paper introduces steganography, the art and science of hidden writing. The purpose of steganography is to hide the existence of a secret message from a third party. The most popular modern application of steganography involves concealing messages within least significant bits of image or sound files. Another application of modern steganography is a steganographic file system. Steganography is also used by some modern printers, where tiny yellow dots that contain encoded printer serial numbers, as well as other information, are added to each printed page.
I chose modern steganography as a topic for my course paper primarily because I have had an interest in the topic before, and would like to use this paper as an opportunity to expand my knowledge of steganographic techniques, especially in their modern applications.

Introduction
In this paper, we will introduce what steganography is and what kind of applications can be expected. Steganography is an art and science of hidding information within other information. The word itself comes from Greek and means ”hidden writting”. First complex book cover- ing steganography was written by Johannes Trithemius in 1499. The book Steganographia itself was published later in 1606 and immediately placed on the Index Librorum Prohibitorum.
In recent years cryptography become very popular science. As stega- nography has very close to cryptography and its applications, we can with advantage highlight the main differences. Cryptography is about conceal- ing the content of the message. At the same time encrypted data package is itself evidence of the existence of valuable information. Steganogra- phy goes a step further and makes the ciphertext invisible to unautho- rized users. Hereby we can de ne steganography as cryptography with the additional property that its output looks unobtrusively. Secret data | Unobtrusive media |
[k>>4]*2^k*257/8,s[j]=k^(k&k*2&34)



References: 1.G. J. Simmons. The prisoner 's problem and the subliminal channel. In Advances in Cryp- tology – CRYPTO '83”, 1983. 3.Niels Provos. Defending against statistical steganalysis. 2001. 4.Rakan El-Khalil and Angelos D. Keromytis. Hydan: Hiding information in program binaries. Technical report, Department of Computer Science, Columbia University, 2004. 5.Imre Csisz´ar. The method of types. IEEE TIT: IEEE Transactions on Information Theory, 44, 1998. 6.Christian Cachin. An information-theoretic model for steganography. Lecture Notes in Computer Science, 1525:306–318, 1998. 7.Luis von Ahn and Nicholas J. Hopper. Public-key steganography. In Lecture Notes in Computer Science, volume 3027 / 2004 of Advances in Cryptology - EUROCRYPT 2004, pages 323–341. Springer-Verlag Heidelberg, 2004. 8.R. Anderson, R. Needham, and A. Shamir. The steganographic le system. In IWIH: Inter- national Workshop on Information Hiding, 1998. 10.Miroslav Dobs´cek. Extended steganographic system. In 8th International Student Confer- ence on Electrical Engineering. FEE CTU, 2004. 11.Luis von Ahn, Nicholas J. Hopper, and John Langford. Provably secure steganography. 2002. Errata included.

You May Also Find These Documents Helpful

  • Better Essays

    Along with this new approach to spying, a new approach to the system of passing messages was introduced as well. The punishment for accused spies, especially spies with evidence, was unavoidable. Suspected spies were hung without question, spies with evidence were walking death traps. New measures needed to be taken in order to protect the spies. Advances in anything from coded messages and fake identities to invisible ink were now being utilized to insure the spy’s safety.…

    • 1287 Words
    • 6 Pages
    Better Essays
  • Good Essays

    Nt1310 Final Exam

    • 3599 Words
    • 15 Pages

    b. digital watermark (Incorrect. A digital watermark is used to identify proprietary data, but it does not protect privacy.)…

    • 3599 Words
    • 15 Pages
    Good Essays
  • Satisfactory Essays

    This can be illustrated by the process of Steganography and encryption using the operating system functions. Steganography is a method of hiding the presence of a message or a file inside another much larger file or message without the forensics knowing it is there in the first place (Westphal, 2003). It is a deliberate act of keeping a message or data hidden. One good example would be hiding pornographic images inside an image…

    • 257 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    The Nsa and Gchq

    • 3038 Words
    • 13 Pages

    If you want to keep information secret, you have two possible strategies: hide the existence of the information, or make the information unintelligible. Cryptography is the art and science of keeping information secure from unintended audiences, of encrypting it. Conversely, cryptanalysis is the art and science of breaking encoded data. The branch of mathematics encompassing both cryptography and cryptanalysis is cryptology. This method of secrecy has existed since 1900 B.C. in the form of Egyptian hieroglyphs. Up to the present two organizations have come to the front of the field; United States ' National Security Agency (NSA) and United Kingdom 's Government Communications Headquarters (GCHQ). In order to understand these institutions in their current state one must know their origins.…

    • 3038 Words
    • 13 Pages
    Powerful Essays
  • Good Essays

    Coding: Questions

    • 2042 Words
    • 18 Pages

    Data hiding, which means that critical data stored inside the object is protected from code outside the object is accomplished in Java by…

    • 2042 Words
    • 18 Pages
    Good Essays
  • Powerful Essays

    The Secret Sharer Analysis

    • 1624 Words
    • 7 Pages

    Dilworth, Thomas. "Conrad 's The Secret Sharer." LINCCWeb SFX Services. N.p., n.d. Web. 02 Dec. 2012. <http://resolver.linccweb.org/FLCC1100?frbrVersion=2>.…

    • 1624 Words
    • 7 Pages
    Powerful Essays
  • Powerful Essays

    Transferring vital information securely without any threat of intrusion is extremely important. Crypography and steganography, both provide security to messages. But, it would be best if both of these are combined and provide a high-level of security. Cryptography only scrambles a message into a form which can’t be understood whereas steganography hides the information in a vessel like Image, Audio or Video. In this Paper, a combination of four techniques is done to analyze the level of security provided be them when they are combined. For cryptography, Diffie-Hellman and One Time Pad cryptography are used. For Steganography, DCT and DWT based techniques are considered. It is further concluded that cryptography combined with steganography offers great potential for securing of data copyright, and detection of infringers. Soon, through a combination of cryptography and steganography, personal messages, files, all artistic creations, pictures, and songs can be protected from piracy.…

    • 2516 Words
    • 11 Pages
    Powerful Essays
  • Satisfactory Essays

    Digital Fortress

    • 278 Words
    • 2 Pages

    "Strathmore's vision had been bold - a world encryption standard with a back door for the NSA" Chapter 96 (page 412)…

    • 278 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Philipp, Aaron; (2009) Hacking Exposed Computer Forensics: Computer Forensics Secrets & Solutions, McGraw Hill Professional, ISBN 0071626778.…

    • 1974 Words
    • 8 Pages
    Powerful Essays
  • Powerful Essays

    [3]. Perez-Gonzlez and F. Balado, “Quantized projection data hiding,”in Proc. Int. Conf. Image Process., 2002, vol. 2, pp. 889–892.…

    • 3433 Words
    • 12 Pages
    Powerful Essays
  • Powerful Essays

    Steganography brings science to the art of hiding information. The purpose of steganography is to convey a message inside of a conduit of misinterpretation such that the existence of the message…

    • 2601 Words
    • 11 Pages
    Powerful Essays
  • Powerful Essays

    Watermarking was introduced for image processing and then it extended for security of text and multimedia data.Now days, it is also used for software and database. There are two phases of the Database Watermarking Techniques. Watermark Embedding and Watermark Verification. During watermark embedding phase, a private key K (known only to the owner) is used to embed the watermark W into the original database. The watermarked database is then made publicly available. To verify the ownership of a suspicious database, the verification process is performed where the suspicious database is taken as input and by using the private key K the embedded watermark is extracted and compared with the original watermark information[5]. The novel approach for the copyright protection for outsourced database for the watermarking,In which watermark is embedded into the secret key and the chaotic random series.for the detection process there is no need of original database and to judge the…

    • 3087 Words
    • 13 Pages
    Powerful Essays
  • Powerful Essays

    Data Leakage Detection

    • 2271 Words
    • 10 Pages

    proceedings. This model that is being developed will be useful for assessing the “guilt” of agents. Also algorithms are…

    • 2271 Words
    • 10 Pages
    Powerful Essays
  • Powerful Essays

    Speech Watermarking System

    • 3244 Words
    • 13 Pages

    Therefore, we can define watermarking systems as systems in which the hidden message is related to the host signal and non-watermarking systems in which the message is unrelated to the host signal. On the other hand,…

    • 3244 Words
    • 13 Pages
    Powerful Essays
  • Powerful Essays

    Lwod Char. Creation

    • 1354 Words
    • 6 Pages

    Background Limit: 5 (Generally 5, for some Background Types the limitation can be lower. For Specific Info, see "Available Background List")…

    • 1354 Words
    • 6 Pages
    Powerful Essays

Related Topics