Preview

Steganography

Better Essays
Open Document
Open Document
928 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Steganography
Steganography

Introduction to Steganography
Codes have been around for centuries ranging from wax, invisible ink, Morse code, the Enigma used by the Germans during World War II and now steganographic. Steganography is the latest form to insidiously hide information over the Internet without a trace of a file being altered. You are able to hide messages within images, voice or music. Steganography is an ancient method of hiding messages. Today messages are hidden in images and music. Steganography can be traced back to the ancient Greek who would write messages on tablets and cover them in wax. This made the tablets look blank and unsuspicious (Kolata, F4). Citizens of ancient civilizations would tattoo messages on their shaved heads. They would then let their hair grown in and travel across enemy lines to deliver the message (Seper, G1). During World War II the Allies placed a ban on flower deliveries with dates, crossword puzzles and even report cards (Kolata, F4) for fear of a message being hidden with in. Steganographers first alter their data by using encryption and then place the image into a pre-select image. Steganographers look for a piece of code that would be the least significant and look the least altered to the human eye (Kolata, F4), being as inconspicuousness and random as possible. This makes the messages undetectable unless you knew that there is a message hidden and you were able to crack the code.

Hacking and Unhacking
Hackers and terrorists have been using this form of technology for years. The United States governmental officials had suspected an attack on the United States for a period of time and thought the information to be hidden using steganography. Anyone can use and get access to steganographic materials. It's easy to download on numerous sights and no software is required. It's an easy and cheap way to keep information secure and undetectable. The number of steganography sites has doubled in the past two years (Kolata, F4).

You May Also Find These Documents Helpful

  • Good Essays

    Summary Of Blown To Bits

    • 283 Words
    • 2 Pages

    What we see on our computer screen is not all the information that the computer knows. Computers can be used to send redacted messages. However, when sending redacted messages, one has to be careful about the way in which they release these messages. For example, one time the U.S. was trying…

    • 283 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Nt1310 Unit 7 Answers

    • 1433 Words
    • 6 Pages

    Encryption is the process of transforming normal content, called plaintext, into unreadable gibberish, called ciphertext.…

    • 1433 Words
    • 6 Pages
    Powerful Essays
  • Best Essays

    paper is to identify the creator and purpose of E/M codes, and also to identify the three key…

    • 2145 Words
    • 8 Pages
    Best Essays
  • Better Essays

    Hidden in Plain View

    • 1031 Words
    • 5 Pages

    Slavery was an extended, often cruel, time in American history; it would take an all-out war before this evil institution was to be abolished. However, while in captivity, many slaves did not merely except their life in shackles. Instead, many fought back and even escaped, using various methods to do so, which Jacqueline L. Tobin documents in Hidden in Plain View. Tobin wrote this book to enlighten the reader to the various methods used to escape from bondage, using both direct and indirect sources, though, ultimately, giving the reader many questions left unanswered.…

    • 1031 Words
    • 5 Pages
    Better Essays
  • Good Essays

    MS13 Symbols

    • 849 Words
    • 4 Pages

    In MS-13 it is very important for them to be able to communicate without using words or at least words that would make them look suspicious. To avoid being caught they use symbols to communicate to one another. Symbols are a mark or character used as a conventional representation of an object, function, or process .…

    • 849 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Navajo Code Talkers

    • 993 Words
    • 4 Pages

    During War World II, the United States needed a secure and immediate way to transmit messages and communicate by telephone and radio in a code that could not be broken by the Japanese. Cryptography is the science or study of writing or solving codes; which made this war effort difficult to accomplish. America succeeded this goal with a code that was not based on any type of science, mathematics, or substitutions, but on a language. This system of massaging and communication was known as the Navajo code and was the most sufficient, secure, and fastest to date.…

    • 993 Words
    • 4 Pages
    Good Essays
  • Good Essays

    According to Price-wright, “For three years, 400 Navajo troops--mostly Marines--used the code in battles with the Japanese. No messages were ever decoded. It is still the only spoken U.S. military code that has never been broken. The Navajo code talkers played an important role in the U.S. victory in World War II. But their work was a secret until 1968. Even after the mission and…

    • 1790 Words
    • 8 Pages
    Good Essays
  • Good Essays

    The Code Talkers

    • 910 Words
    • 4 Pages

    From ancient Egyptians to Julius Caesar to Mary Queen of Scots to modern times, nations, kings and their armed forces have always had an overarching need for secure methods of communications. During World War I, the United States Army experimented, with limited success, with the use of Native American tribal languages, such as the Comanche and Choctaw, in the place of codes (Paul 7). The use of ancient languages in modern times had also been attempted by various governments, but the risk of any national understanding the language chosen would compromise the entire code. During World War II, the Allied forces cracked the Enigma, the main encoding system for Nazi Germany and also the codes Red and Purple used by Imperial Japan. The need for an unbreakable code was absolutely necessary for frontline action. However, this code had to be quick, effective, and simple yet complex enough so the enemy would not be able to decipher the vital messages being sent. Then the Navajo code talkers were formed, an elite unit in the United States Marine Corps (Pincock 119). This spoken code, however, would be unique, a code within a language characterized by guttural noises, grunts, and complex inflections that are highly difficult to learn after a certain age. A perfect, unbreakable radio code was born.…

    • 910 Words
    • 4 Pages
    Good Essays
  • Good Essays

    SWAT Codes

    • 674 Words
    • 3 Pages

    Written Codes: Any text that appears on the screen, either as a part of the film itself (product names, signs, newspapers) or through credits, subtitles etc.…

    • 674 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Once a spy has an amount of important information concerning the enemy, their job is only half over. Now they must transport the valuable facts to someone important who will know what to do with them, and of course you cannot be caught with suspicious material. Messages were relayed by many different techniques. Spies used a great variety of secret methods to send their information. Secret ink was popular…

    • 1527 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    Message coded – individual thinks about how they are going to say what they are thinking and decides in what form the communication will be i.e spoken words or sign language. An individual puts it into this form.…

    • 973 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Wgu Ebt 1 Task 2

    • 1487 Words
    • 6 Pages

    Kelley, P. E., Friedman, N., Johnson, C. (2007). Ear, nose, and throat. In W. W. Hay, M. J. Levin, J. M. Sondheimer, & R. R. Deterding (Eds.), Current pediatric diagnosis and treatment (18th ed., pp. 459–492). New York: Lange Medical Books/McGraw-Hill.…

    • 1487 Words
    • 6 Pages
    Better Essays
  • Good Essays

    Technology Synthesis Essay

    • 1003 Words
    • 5 Pages

    As technology grows the ways of communicating continue to become more effective. We have the ability to communicate through cell phones and the internet. The advancement in technology has invented the way of texting on a cell phone or using the social media on the internet. Lynne Truss, the author of The Joy of Texting, gives a great example of what texting is by saying “texting is a supremely secretive medium of communication-its like passing a note…” Using the example of passing a note is a great way of interpreting a text because no one knows what the text says and it…

    • 1003 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    C. External incentives for the behavior (such as economic gain, avoiding legal responsibility, or improving physical well-being, as in Malingering) are absent. (p.517)…

    • 3920 Words
    • 16 Pages
    Powerful Essays
  • Good Essays

    Morse Code

    • 302 Words
    • 2 Pages

    Morse Code was designed by Samuel Morse and Alfred Vail. It uses short and long pulses - tones or lights - to represent letters and numbers. Probably the most well known Morse Code Message is the one made up of three short pulses, then three long pulses, then three short pulses again. Or "dot dot dot, dash dash dash, dot dot dot." This message means "S O S" (S = "..." and O is "---"), the distress signal.…

    • 302 Words
    • 2 Pages
    Good Essays

Related Topics