Preview

Modern Steganography

Powerful Essays
Open Document
Open Document
1774 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Modern Steganography
Abstract
This paper introduces steganography, the art and science of hidden writing. The purpose of steganography is to hide the existence of a secret message from a third party. The most popular modern application of steganography involves concealing messages within least significant bits of image or sound files. Another application of modern steganography is a steganographic file system. Steganography is also used by some modern printers, where tiny yellow dots that contain encoded printer serial numbers, as well as other information, are added to each printed page.
I chose modern steganography as a topic for my course paper primarily because I have had an interest in the topic before, and would like to use this paper as an opportunity to expand my knowledge of steganographic techniques, especially in their modern applications. Introduction
Steganography is the art and science of hidden writing. The purpose of steganography is to hide the existence of a secret communication from a third party. Usually, a steganographic message will appear to be something else: a picture, an audio file, or some other message (the covertext). The advantage of steganography over cryptography alone is that steganographic message does not attract attention to communicating parties. An apparent encrypted message, no matter how unbreakable it is, can arouse suspicion and may in itself be incriminating. If suspicion is raised, then the goal of steganography is defeated. Since there is always a possibility that secret communication will be uncovered, steganography is often used together with cryptography. A steganographic message (the plaintext) is first encrypted by some modern encryption algorithms, and then a covertext is modified in some way to contain the encrypted message (the ciphertext), resulting in stegotext.
Digital Steganography
A typical digital steganographic encoder is presented on Figure 1. The message is the data that the sender wishes to remain

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Unit 8 Assignment

    • 380 Words
    • 2 Pages

    e. ____________________ is the use of an algorithm to scramble data into a format that can be read only by reversing the algorithm.…

    • 380 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Nt1310 Final Exam

    • 3599 Words
    • 15 Pages

    b. digital watermark (Incorrect. A digital watermark is used to identify proprietary data, but it does not protect privacy.)…

    • 3599 Words
    • 15 Pages
    Good Essays
  • Good Essays

    Cvsa

    • 1030 Words
    • 5 Pages

    This paper will discuss the various methods and techniques that can be employed in an attempt to beat the polygraph.…

    • 1030 Words
    • 5 Pages
    Good Essays
  • Better Essays

    Spyware

    • 2042 Words
    • 9 Pages

    Awad, Neveen Farag, and Kristina Fitzgerald. "The Deceptive Behaviors That OFFEND US MOST About Spyware." Communications Of The ACM 48.8 (2005): 55-60. Business Source Elite. Web. 15 June 2013.…

    • 2042 Words
    • 9 Pages
    Better Essays
  • Powerful Essays

    The information in this paper will investigate the elements involved in computer security. Protecting information today requires more than just locking a door or filing cabinet. With data being stored electronically, it is vital that important information be protected from prying eyes. There are many different methods for protecting information that is stored on computers. These methods include everything from password and usernames to biometric devices. There are also software solutions that are used, including antivirus and anti-malware software along with firewalls. All of this is to accomplish the desired…

    • 1544 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    This can be illustrated by the process of Steganography and encryption using the operating system functions. Steganography is a method of hiding the presence of a message or a file inside another much larger file or message without the forensics knowing it is there in the first place (Westphal, 2003). It is a deliberate act of keeping a message or data hidden. One good example would be hiding pornographic images inside an image…

    • 257 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    created by vaporization of liquid which causes expansion of the liquid and therefore making a shock wave. Fireworks are also used in television quite frequently and have a lot of chemistry behind the scenes. This includes the different metals changing the color, the gunpowder to fuel the explosion, and finally the ingredients such as charcoal and potassium nitrate that are what make the reaction.…

    • 1626 Words
    • 7 Pages
    Better Essays
  • Good Essays

    What evidence is there in this scene that relates to the concept of dissembling (hiding…

    • 528 Words
    • 3 Pages
    Good Essays
  • Good Essays

    The most common methods of obfuscation are numeric variance, character scrambling, nulling, aggregating, encoding, artificial data generating, and repeating of the character masking process (Magnabosco, 2009). These methods rely on functions that exist in the SQL system server.…

    • 684 Words
    • 3 Pages
    Good Essays
  • Better Essays

    As a child, were you intrigued by the idea of sending a secret message to your best friend? Perhaps you were fascinated by the thought of using an invisible ink pen. If so, then I suggest learning about steganography. According to the online Free Merriam-Webster Dictionary, the definition of steganography is the art or practice of concealing a message, image, or file within another message, image, or file (Merriam-Webster, 2011). People can use many different techniques for steganography, using it for a variety of reasons. Steganography has been used for many years in forms such…

    • 789 Words
    • 4 Pages
    Better Essays
  • Good Essays

    Counterfeiting money is a big business for criminals. Nearly $70 million of fake currency gets used daily, costing consumers millions. In the present day, there are many new technologies that have been discovered and studied in order to help put counterfeiters out of business. Our currency is something that we must protect, which is why these technologies and discoveries are very important in the safety and development of our economy. The new generation of Philippine banknotes includes new and more advanced technology to ensure the safety of the genuine Philippine banknotes. This is to prevent money counterfeiting in our country. These new features include more advanced photo editing, which features micro printing on the different images and texts on the banknotes, a unique rough texture, a new system of serial numbering, advanced security fibers and security threads, watermark technology, and optically variable ink. These are the most advanced and efficient methods of preventing money counterfeiting today. Provided in this paper is a detailed explanation and description of each security precaution and a detailed review of the methods used to execute them.…

    • 1552 Words
    • 7 Pages
    Good Essays
  • Powerful Essays

    However, several cryptographic methods are available such as symmetric-key encryption, Caesar’s cipher and public key cryptography [2]. By using these methods several data encryption methods have been implemented.…

    • 3611 Words
    • 15 Pages
    Powerful Essays
  • Satisfactory Essays

    Invisible Technology

    • 467 Words
    • 2 Pages

    Invisibility has long been one of the marvels of science fiction and fantasy, from the pages of The Invisible Man, to the magic invisibility cloak of the Harry Potter books. Yet, this is actually a modern technology initiated from ancient magical or miraculous occurrence. Invisibility is the state of an object that cannot be seen which in nature this is known as transparency. Now, Japanese scientist has successfully invented a real functioning invisible cloak using the theory of mirage or often considered as supreme camouflage. How it works? A famous method used by scientist is a stone in a river technique, in which the water passes around it, but leaves no trace of a stone being in the water where the light waves pass around that object and bend the light on its surface, leaving no visible aspects of it, possibly not even a shadow.…

    • 467 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    4. Collberg, C., Thomborson, C., Low, D.: Manufacturing cheap, resilient, and stealthy opaque constructs. In: Conference on Principles…

    • 8999 Words
    • 36 Pages
    Powerful Essays
  • Powerful Essays

    Cut and paste the cmd.exe file in desktop and rename this file from cmd.exe to sethc.exe…

    • 614 Words
    • 3 Pages
    Powerful Essays

Related Topics