Preview

Steganography

Better Essays
Open Document
Open Document
928 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Steganography
Steganography

Introduction to Steganography
Codes have been around for centuries ranging from wax, invisible ink, Morse code, the Enigma used by the Germans during World War II and now steganographic. Steganography is the latest form to insidiously hide information over the Internet without a trace of a file being altered. You are able to hide messages within images, voice or music. Steganography is an ancient method of hiding messages. Today messages are hidden in images and music. Steganography can be traced back to the ancient Greek who would write messages on tablets and cover them in wax. This made the tablets look blank and unsuspicious (Kolata, F4). Citizens of ancient civilizations would tattoo messages on their shaved heads. They would then let their hair grown in and travel across enemy lines to deliver the message (Seper, G1). During World War II the Allies placed a ban on flower deliveries with dates, crossword puzzles and even report cards (Kolata, F4) for fear of a message being hidden with in. Steganographers first alter their data by using encryption and then place the image into a pre-select image. Steganographers look for a piece of code that would be the least significant and look the least altered to the human eye (Kolata, F4), being as inconspicuousness and random as possible. This makes the messages undetectable unless you knew that there is a message hidden and you were able to crack the code.

Hacking and Unhacking
Hackers and terrorists have been using this form of technology for years. The United States governmental officials had suspected an attack on the United States for a period of time and thought the information to be hidden using steganography. Anyone can use and get access to steganographic materials. It's easy to download on numerous sights and no software is required. It's an easy and cheap way to keep information secure and undetectable. The number of steganography sites has doubled in the past two years (Kolata, F4).

You May Also Find These Documents Helpful

  • Good Essays

    Message coded – individual thinks about how they are going to say what they are thinking and decides in what form the communication will be i.e spoken words or sign language. An individual puts it into this form.…

    • 973 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Message coded – when the idea has been thought through, there is a thought process of how this idea is going to then be communicated. There is a thought as to how this message is going to express it, as it could be through language, writing, sign or symbols or whatever it may be.…

    • 778 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Summary Of Blown To Bits

    • 283 Words
    • 2 Pages

    What we see on our computer screen is not all the information that the computer knows. Computers can be used to send redacted messages. However, when sending redacted messages, one has to be careful about the way in which they release these messages. For example, one time the U.S. was trying…

    • 283 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    2. Message coded: this is the way that an individual puts his thoughts together with the way he is going to communicate, putting the thoughts into language or into some other code such as sign language.…

    • 1408 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Navajo Code Talkers

    • 993 Words
    • 4 Pages

    During War World II, the United States needed a secure and immediate way to transmit messages and communicate by telephone and radio in a code that could not be broken by the Japanese. Cryptography is the science or study of writing or solving codes; which made this war effort difficult to accomplish. America succeeded this goal with a code that was not based on any type of science, mathematics, or substitutions, but on a language. This system of massaging and communication was known as the Navajo code and was the most sufficient, secure, and fastest to date.…

    • 993 Words
    • 4 Pages
    Good Essays
  • Good Essays

    MS13 Symbols

    • 849 Words
    • 4 Pages

    In MS-13 it is very important for them to be able to communicate without using words or at least words that would make them look suspicious. To avoid being caught they use symbols to communicate to one another. Symbols are a mark or character used as a conventional representation of an object, function, or process .…

    • 849 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Once a spy has an amount of important information concerning the enemy, their job is only half over. Now they must transport the valuable facts to someone important who will know what to do with them, and of course you cannot be caught with suspicious material. Messages were relayed by many different techniques. Spies used a great variety of secret methods to send their information. Secret ink was popular…

    • 1527 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    According to Price-wright, “For three years, 400 Navajo troops--mostly Marines--used the code in battles with the Japanese. No messages were ever decoded. It is still the only spoken U.S. military code that has never been broken. The Navajo code talkers played an important role in the U.S. victory in World War II. But their work was a secret until 1968. Even after the mission and…

    • 1790 Words
    • 8 Pages
    Good Essays
  • Good Essays

    Technology Synthesis Essay

    • 1003 Words
    • 5 Pages

    As technology grows the ways of communicating continue to become more effective. We have the ability to communicate through cell phones and the internet. The advancement in technology has invented the way of texting on a cell phone or using the social media on the internet. Lynne Truss, the author of The Joy of Texting, gives a great example of what texting is by saying “texting is a supremely secretive medium of communication-its like passing a note…” Using the example of passing a note is a great way of interpreting a text because no one knows what the text says and it…

    • 1003 Words
    • 5 Pages
    Good Essays
  • Good Essays

    SWAT Codes

    • 674 Words
    • 3 Pages

    Written Codes: Any text that appears on the screen, either as a part of the film itself (product names, signs, newspapers) or through credits, subtitles etc.…

    • 674 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Message coded: once we have thought of an idea we compose this within our thoughts, how we are going to say our idea to the recipient in a way the recipient will understand. For example, is the message going to be spoken to them, do they speak English. Is the message going to written down for them or are we going to use sign language, if so, what signs are we going to use to portray our message.…

    • 1094 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Morse Code

    • 302 Words
    • 2 Pages

    Morse Code was designed by Samuel Morse and Alfred Vail. It uses short and long pulses - tones or lights - to represent letters and numbers. Probably the most well known Morse Code Message is the one made up of three short pulses, then three long pulses, then three short pulses again. Or "dot dot dot, dash dash dash, dot dot dot." This message means "S O S" (S = "..." and O is "---"), the distress signal.…

    • 302 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    1. Introduction Data hiding is an information security technology used for protecting information not to be perceptible, where a sender can use the data hiding technique to hide information from being detected, stolen, or damaged by unauthorized users during transmission via public networks. Data hiding is able to avoid detection that…

    • 6788 Words
    • 28 Pages
    Powerful Essays
  • Better Essays

    Hidden in Plain View

    • 1031 Words
    • 5 Pages

    Slavery was an extended, often cruel, time in American history; it would take an all-out war before this evil institution was to be abolished. However, while in captivity, many slaves did not merely except their life in shackles. Instead, many fought back and even escaped, using various methods to do so, which Jacqueline L. Tobin documents in Hidden in Plain View. Tobin wrote this book to enlighten the reader to the various methods used to escape from bondage, using both direct and indirect sources, though, ultimately, giving the reader many questions left unanswered.…

    • 1031 Words
    • 5 Pages
    Better Essays
  • Better Essays

    In a world where identity theft is on the rise, hackers are hard at work trying to get people’s credit card numbers, and where companies are getting your information to sell you unwanted things, tight security has become a large factor of keeping the personal and confidential information of our society safe. Cryptology and Cipher codes are commonly used ways to keep confidential information protected by preventing people not in on the secret from understanding what is being transmitted. Cryptology is the science of secure communication which is also the encoding and decoding of data. Cipher codes are more complicated because it is a method used to transform a message into an obscure form. The use of these secured messages has been dated back to the first societies of the world where they were used for many of the same reasons they are today. The first use of written cryptology was believed to take place at about 1900 B.C when an Egyptian scribe first used a non-standard form of hieroglyphics in his writing. Then in 1500 B.C in Mesopotamia (common day Iraq), an enciphered message in cuneiform was used to conceal a formula to make glazes for pottery. In the years 500 through 600 B.C, Hebrew scribes used a reverse alphabet simple substitution cipher to write the book of Jeremiah which was known as ATBASH. The Greeks used a device called a scytale (rhymes with Italy) in 487 B.C which consisted of a strip of leather that was wrapped and then written on then used as a belt which the recipient would be wearing as well and that would decode the message. The famous Julius Caesar used cryptology to keep government communications private throughout 50 to 60 B.C. Even the first president of the United States George Washington used encoded messages to send to his fellow soldiers. Therefore, cryptology and cipher codes have played large roles in the confidentiality of societies in the past…

    • 1725 Words
    • 7 Pages
    Better Essays

Related Topics