Unseen: An Overview of Steganography and Presentation of Associated Java Application C-Hide
Jessica Codr, jmc5@cec.wustl.edu (A project report written under the guidance of Prof. Raj Jain) Download
ABSTRACT:
People have desired to keep certain sensitive communications secret for thousands of years. In our new age of digital media and internet communications, this need often seems even more pressing. This paper presents general information about steganography, the art of data hiding. The paper provides an overview of steganography, general forms of steganography, specific steganographic methods, and recent developments in the field. The information presented in this paper is also applied to a program developed by the author, and some sample runs of the program are presented.
KEYWORDS: steganography, steganalysis, data hiding, data security, data embedding, stego-objects, watermarking, secret communications, secret messages, hidden messages, hidden channel, covert channel, LSB alterations
TABLE OF CONTENTS:
1. Introduction and Overview 1. Steganography Versus Cryptology 2. Characteristics of Strong Steganography 3. Origins of Steganography 2. Cover Media and General Steganography Techniques 1. Digital Media 2. Text 3. Network Communications 3. Specific Steganographic Tactics 1. Least Significant Bit Alterations 2. Transform Domain Techniques 3. Data Dispersal and Feature Modification Techniques 4. Non-Image Techniques 4. Cutting-Edge Developments 1. Novel View of Steganography 2. Advances with JPEGs 3. Advances with Networks 4. Steganalysis and Artificial Intelligence 5. Other Recent Developments
http://www.cse.wustl.edu/~jain/cse571-09/ftp/stegano/index.html
1 of 21
Unseen: An Overview of Steganography and Presentation of Associated Java Application C-Hide
5. Author's Application and Conclusions 1. My Application: Description 2. My Application: