Preview

Modern Steganography

Powerful Essays
Open Document
Open Document
2063 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Modern Steganography
Modern Steganography

Abstract
This paper introduces steganography, the art and science of hidden writing. The purpose of steganography is to hide the existence of a secret message from a third party. The most popular modern application of steganography involves concealing messages within least significant bits of image or sound files. Another application of modern steganography is a steganographic file system. Steganography is also used by some modern printers, where tiny yellow dots that contain encoded printer serial numbers, as well as other information, are added to each printed page.
I chose modern steganography as a topic for my course paper primarily because I have had an interest in the topic before, and would like to use this paper as an opportunity to expand my knowledge of steganographic techniques, especially in their modern applications.

Introduction
In this paper, we will introduce what steganography is and what kind of applications can be expected. Steganography is an art and science of hidding information within other information. The word itself comes from Greek and means ”hidden writting”. First complex book cover- ing steganography was written by Johannes Trithemius in 1499. The book Steganographia itself was published later in 1606 and immediately placed on the Index Librorum Prohibitorum.
In recent years cryptography become very popular science. As stega- nography has very close to cryptography and its applications, we can with advantage highlight the main differences. Cryptography is about conceal- ing the content of the message. At the same time encrypted data package is itself evidence of the existence of valuable information. Steganogra- phy goes a step further and makes the ciphertext invisible to unautho- rized users. Hereby we can de ne steganography as cryptography with the additional property that its output looks unobtrusively. Secret data | Unobtrusive media |
[k>>4]*2^k*257/8,s[j]=k^(k&k*2&34)



References: 1.G. J. Simmons. The prisoner 's problem and the subliminal channel. In Advances in Cryp- tology – CRYPTO '83”, 1983. 3.Niels Provos. Defending against statistical steganalysis. 2001. 4.Rakan El-Khalil and Angelos D. Keromytis. Hydan: Hiding information in program binaries. Technical report, Department of Computer Science, Columbia University, 2004. 5.Imre Csisz´ar. The method of types. IEEE TIT: IEEE Transactions on Information Theory, 44, 1998. 6.Christian Cachin. An information-theoretic model for steganography. Lecture Notes in Computer Science, 1525:306–318, 1998. 7.Luis von Ahn and Nicholas J. Hopper. Public-key steganography. In Lecture Notes in Computer Science, volume 3027 / 2004 of Advances in Cryptology - EUROCRYPT 2004, pages 323–341. Springer-Verlag Heidelberg, 2004. 8.R. Anderson, R. Needham, and A. Shamir. The steganographic le system. In IWIH: Inter- national Workshop on Information Hiding, 1998. 10.Miroslav Dobs´cek. Extended steganographic system. In 8th International Student Confer- ence on Electrical Engineering. FEE CTU, 2004. 11.Luis von Ahn, Nicholas J. Hopper, and John Langford. Provably secure steganography. 2002. Errata included.

You May Also Find These Documents Helpful

  • Better Essays

    Along with this new approach to spying, a new approach to the system of passing messages was introduced as well. The punishment for accused spies, especially spies with evidence, was unavoidable. Suspected spies were hung without question, spies with evidence were walking death traps. New measures needed to be taken in order to protect the spies. Advances in anything from coded messages and fake identities to invisible ink were now being utilized to insure the spy’s safety.…

    • 1287 Words
    • 6 Pages
    Better Essays
  • Good Essays

    Nt1310 Final Exam

    • 3599 Words
    • 15 Pages

    b. digital watermark (Incorrect. A digital watermark is used to identify proprietary data, but it does not protect privacy.)…

    • 3599 Words
    • 15 Pages
    Good Essays
  • Good Essays

    Week 3 Lab Assignment

    • 981 Words
    • 4 Pages

    Introduction To Codes, Ciphers, & Codebreaking. (2010, July 13). Retrieved from Vectorsite: Introduction To Codes, Ciphers, & Codebreaking…

    • 981 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Spyware

    • 2042 Words
    • 9 Pages

    Spy-ware is a program that is inadvertently installed on the user’s computer without their knowledge the program covertly obtains data from the computer and transmits it to another. Spy-ware can track the websites that the user visits, collect information on the user’s clicks, gather keystrokes and obtain sign in and passwords. Spy-ware can be of a conspicuous nature where the user is somewhat aware of; additional pop-up advertising, slowing down of computer processing, and computer setting changes. The most concerning type of spy-ware has traits that are…

    • 2042 Words
    • 9 Pages
    Better Essays
  • Satisfactory Essays

    This can be illustrated by the process of Steganography and encryption using the operating system functions. Steganography is a method of hiding the presence of a message or a file inside another much larger file or message without the forensics knowing it is there in the first place (Westphal, 2003). It is a deliberate act of keeping a message or data hidden. One good example would be hiding pornographic images inside an image…

    • 257 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    The Nsa and Gchq

    • 3038 Words
    • 13 Pages

    If you want to keep information secret, you have two possible strategies: hide the existence of the information, or make the information unintelligible. Cryptography is the art and science of keeping information secure from unintended audiences, of encrypting it. Conversely, cryptanalysis is the art and science of breaking encoded data. The branch of mathematics encompassing both cryptography and cryptanalysis is cryptology. This method of secrecy has existed since 1900 B.C. in the form of Egyptian hieroglyphs. Up to the present two organizations have come to the front of the field; United States ' National Security Agency (NSA) and United Kingdom 's Government Communications Headquarters (GCHQ). In order to understand these institutions in their current state one must know their origins.…

    • 3038 Words
    • 13 Pages
    Powerful Essays
  • Satisfactory Essays

    Greenberg wrote this article to talk about new technology and digital watermarks that help prevent identity theft. Greenberg states, “Reports on the use of biometrics technology and digital watermarks to secure important documents and prevent identity theft. Information on the biometric technology; Features of the digital watermarks; Responsibilities of individuals who are using these technologies.” This article relates to my topic because it explains, what can contribute to decreasing identity theft. This article is valid because it gives many examples on decreasing identity theft.…

    • 626 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Coding: Questions

    • 2042 Words
    • 18 Pages

    Data hiding, which means that critical data stored inside the object is protected from code outside the object is accomplished in Java by…

    • 2042 Words
    • 18 Pages
    Good Essays
  • Powerful Essays

    The Secret Sharer Analysis

    • 1624 Words
    • 7 Pages

    Dilworth, Thomas. "Conrad 's The Secret Sharer." LINCCWeb SFX Services. N.p., n.d. Web. 02 Dec. 2012. <http://resolver.linccweb.org/FLCC1100?frbrVersion=2>.…

    • 1624 Words
    • 7 Pages
    Powerful Essays
  • Powerful Essays

    Transferring vital information securely without any threat of intrusion is extremely important. Crypography and steganography, both provide security to messages. But, it would be best if both of these are combined and provide a high-level of security. Cryptography only scrambles a message into a form which can’t be understood whereas steganography hides the information in a vessel like Image, Audio or Video. In this Paper, a combination of four techniques is done to analyze the level of security provided be them when they are combined. For cryptography, Diffie-Hellman and One Time Pad cryptography are used. For Steganography, DCT and DWT based techniques are considered. It is further concluded that cryptography combined with steganography offers great potential for securing of data copyright, and detection of infringers. Soon, through a combination of cryptography and steganography, personal messages, files, all artistic creations, pictures, and songs can be protected from piracy.…

    • 2516 Words
    • 11 Pages
    Powerful Essays
  • Powerful Essays

    [3]. Perez-Gonzlez and F. Balado, “Quantized projection data hiding,”in Proc. Int. Conf. Image Process., 2002, vol. 2, pp. 889–892.…

    • 3433 Words
    • 12 Pages
    Powerful Essays
  • Powerful Essays

    Data Leakage Detection

    • 2271 Words
    • 10 Pages

    proceedings. This model that is being developed will be useful for assessing the “guilt” of agents. Also algorithms are…

    • 2271 Words
    • 10 Pages
    Powerful Essays
  • Powerful Essays

    Speech Watermarking System

    • 3244 Words
    • 13 Pages

    Therefore, we can define watermarking systems as systems in which the hidden message is related to the host signal and non-watermarking systems in which the message is unrelated to the host signal. On the other hand,…

    • 3244 Words
    • 13 Pages
    Powerful Essays
  • Powerful Essays

    Lwod Char. Creation

    • 1354 Words
    • 6 Pages

    Background Limit: 5 (Generally 5, for some Background Types the limitation can be lower. For Specific Info, see "Available Background List")…

    • 1354 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    Watermarking was introduced for image processing and then it extended for security of text and multimedia data.Now days, it is also used for software and database. There are two phases of the Database Watermarking Techniques. Watermark Embedding and Watermark Verification. During watermark embedding phase, a private key K (known only to the owner) is used to embed the watermark W into the original database. The watermarked database is then made publicly available. To verify the ownership of a suspicious database, the verification process is performed where the suspicious database is taken as input and by using the private key K the embedded watermark is extracted and compared with the original watermark information[5]. The novel approach for the copyright protection for outsourced database for the watermarking,In which watermark is embedded into the secret key and the chaotic random series.for the detection process there is no need of original database and to judge the…

    • 3087 Words
    • 13 Pages
    Powerful Essays

Related Topics