Abstract
This paper introduces steganography, the art and science of hidden writing. The purpose of steganography is to hide the existence of a secret message from a third party. The most popular modern application of steganography involves concealing messages within least significant bits of image or sound files. Another application of modern steganography is a steganographic file system. Steganography is also used by some modern printers, where tiny yellow dots that contain encoded printer serial numbers, as well as other information, are added to each printed page.
I chose modern steganography as a topic for my course paper primarily because I have had an interest in the topic before, and would like to use this paper as an opportunity to expand my knowledge of steganographic techniques, especially in their modern applications.
Introduction
In this paper, we will introduce what steganography is and what kind of applications can be expected. Steganography is an art and science of hidding information within other information. The word itself comes from Greek and means ”hidden writting”. First complex book cover- ing steganography was written by Johannes Trithemius in 1499. The book Steganographia itself was published later in 1606 and immediately placed on the Index Librorum Prohibitorum.
In recent years cryptography become very popular science. As stega- nography has very close to cryptography and its applications, we can with advantage highlight the main differences. Cryptography is about conceal- ing the content of the message. At the same time encrypted data package is itself evidence of the existence of valuable information. Steganogra- phy goes a step further and makes the ciphertext invisible to unautho- rized users. Hereby we can de ne steganography as cryptography with the additional property that its output looks unobtrusively. Secret data | Unobtrusive media |
[k>>4]*2^k*257/8,s[j]=k^(k&k*2&34)
References: 1.G. J. Simmons. The prisoner 's problem and the subliminal channel. In Advances in Cryp- tology – CRYPTO '83”, 1983. 3.Niels Provos. Defending against statistical steganalysis. 2001. 4.Rakan El-Khalil and Angelos D. Keromytis. Hydan: Hiding information in program binaries. Technical report, Department of Computer Science, Columbia University, 2004. 5.Imre Csisz´ar. The method of types. IEEE TIT: IEEE Transactions on Information Theory, 44, 1998. 6.Christian Cachin. An information-theoretic model for steganography. Lecture Notes in Computer Science, 1525:306–318, 1998. 7.Luis von Ahn and Nicholas J. Hopper. Public-key steganography. In Lecture Notes in Computer Science, volume 3027 / 2004 of Advances in Cryptology - EUROCRYPT 2004, pages 323–341. Springer-Verlag Heidelberg, 2004. 8.R. Anderson, R. Needham, and A. Shamir. The steganographic le system. In IWIH: Inter- national Workshop on Information Hiding, 1998. 10.Miroslav Dobs´cek. Extended steganographic system. In 8th International Student Confer- ence on Electrical Engineering. FEE CTU, 2004. 11.Luis von Ahn, Nicholas J. Hopper, and John Langford. Provably secure steganography. 2002. Errata included.