Preview

Steganography

Powerful Essays
Open Document
Open Document
1427 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Steganography
INTRODUCION
Steganography is the art of concealing private or sensitive information within a carrier that for all intents and purposes, appears innocuous. It comes from the Greek words steganós (covered) and graptos (writing). Simply put, if you were to view the presented information, it would appear to be something that does not warrant further analysis due to the fact that it does not LOOK or SOUND like anything that contains sensitive information. Steganography has been used for hundreds of years as a means of concealing information from prying eyes before ultimately reaching its intended destination. Examples of its use in history are detailed in the following section The History of Steganography. It relies on the sender and receiver agreeing upon the method by which the information will be hidden and therefore some means of prior communication is essential for steganography to be of any use. Steganography is sometimes confused with cryptography. Although the two can co-exist as discussed later in this document, they are not the same. Both are used to protect information but steganography is concerned with concealing information thereby making it unseen while cryptography is concerned with encrypting information thereby making it unreadable.
Review
Steganography relies on the fact that the human senses are inadequate when compared to analysis performed by machines or even in fact the senses of other animals of the earth. The human eye or the human ear cannot detect very subtle or minute changes in visual or aural presentations making steganography an effective means of concealing private information. One major factor in steganography is that it relies on the fact that a person does not know that a picture or a sound file or a block of text actually contains hidden information. It is a much more effective means of protecting information if the attacker (unintended or unauthorized recipient of information) does not know that the material presented before them



References: 1. Kipper, Greg “Investigator’s Guide to Steganography” Auerbach Publications, 2004 2. Fridrich, Goljan, Du. “Reliable Detection of LSB Steganography in Color and Grayscale Images” http://www.ws.binghamton.edu/fridrich/Research/acmwrkshp_version.pdf 3. Zollner, Federrath, Klimant, Pfitzmann, Piotraschke, Westfeld, Wicke, Wolf. “Modelling the security of steganographic systems” Paper presented at the 2nd Workshop on Information Hiding – April 1998, Portland. 4. Cole, Eric. “Book Excerpt: Hiding in Plain Sight” Published on Computerworld August 4th 2003. http://www.computerworld.com/printthis/2003/0,4814,83714,00.html 5. SpyHunter “Steganography & Steganalysis” Presentation made at Infosec 2004 Conference 6. Petitcolas, Fabian Anderson, Ross J Kuhn, Markus. Attacks on copyright marking systems, in David Aucsmith (Ed), “Information Hiding – A Survey”, Second International Workshop, IH’98, Portland, Oregon, U.S.A., April 15-17, 1998, Proceedings, LNCS 1525, Springer-Verlag, ISBN 3-540-65386-4, pp. 219- 239. And Fabien A. P. Petitcolas. Watermarking schemes evaluation. I.E.E.E. Signal Processing, vol. 17, no. 5, pp. 58–64, September 2000.

You May Also Find These Documents Helpful

  • Better Essays

    Cmgt400 Week3

    • 1493 Words
    • 6 Pages

    References: 1. (2010). Principles of Computer Security: CompTIA Security+ and Beyond (2nd ed.). : McGraw-Hill.…

    • 1493 Words
    • 6 Pages
    Better Essays
  • Better Essays

    Along with this new approach to spying, a new approach to the system of passing messages was introduced as well. The punishment for accused spies, especially spies with evidence, was unavoidable. Suspected spies were hung without question, spies with evidence were walking death traps. New measures needed to be taken in order to protect the spies. Advances in anything from coded messages and fake identities to invisible ink were now being utilized to insure the spy’s safety.…

    • 1287 Words
    • 6 Pages
    Better Essays
  • Good Essays

    Nt1310 Final Exam

    • 3599 Words
    • 15 Pages

    b. digital watermark (Incorrect. A digital watermark is used to identify proprietary data, but it does not protect privacy.)…

    • 3599 Words
    • 15 Pages
    Good Essays
  • Powerful Essays

    SAMPLE Security Policy

    • 3395 Words
    • 13 Pages

    References: Hausman, K., Weiss, M., & Barrett, D. (2011). Comptia security sy0-301. (3rd ed.). Pearson Education, Inc.…

    • 3395 Words
    • 13 Pages
    Powerful Essays
  • Good Essays

    Cvsa

    • 1030 Words
    • 5 Pages

    Before we discuss what methods and techniques are available to be used in an effort to “beat” the polygraph, we need to discuss what the polygraph is and how it works. The polygraph is a deception detection device. The way it works is the subject is connected to the machine through a series of wires that are attached to the subject at various points of the body. It monitors physiological changes such as heart rate, breathing, blood pressure, and even sweating. The reason these bodily functions are monitored is because they are normally incontrollable. Before the beginning of the test, the examiner will ask some basic questions in order to establish a base line with which to compare the responses that are received during the test. Once the test starts, if any of the monitored items fluctuate then the examiner may determine that the subject is being deceptive (Alder, 2009).…

    • 1030 Words
    • 5 Pages
    Good Essays
  • Better Essays

    References: Conklin, W. A., White, G., Williams, D., Davis, R., & Cothren, C. (2012). Principles of computer security: CompTIA Security+™ and beyond (3rd ed.). New York, NY: McGraw Hill.…

    • 1432 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    This can be illustrated by the process of Steganography and encryption using the operating system functions. Steganography is a method of hiding the presence of a message or a file inside another much larger file or message without the forensics knowing it is there in the first place (Westphal, 2003). It is a deliberate act of keeping a message or data hidden. One good example would be hiding pornographic images inside an image…

    • 257 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    References: Conklin, A., Williams, G., Davis, R., & Cothren, C. (2012). Principles of Computer Security: CompTIA Security+ and Beyond (3rd ed.). New York, NY: McGraw-Hill/Osborne Media.…

    • 1725 Words
    • 5 Pages
    Better Essays
  • Better Essays

    1984 and Privacy

    • 893 Words
    • 4 Pages

    Fordahl, Matthew. "Eavesdroppers Sift Through Data Bit by Bit." Palm Beach Post 29 Jan 2006: SIRS Knowledge Source. SIRS Researcher. OTHS. 02 Jun 2006…

    • 893 Words
    • 4 Pages
    Better Essays
  • Best Essays

    References: Stoneburner, Gary. “Computer Security”, Retrieved November 11, 2011, From National Institute of Standards and Technology at http://csrc.nist.gov/publications/nistpubs/800-27A/SP800-27-RevA.pdf…

    • 3482 Words
    • 14 Pages
    Best Essays
  • Good Essays

    Photos and videos can contain information that on its own may seem innocuous, but when…

    • 1176 Words
    • 6 Pages
    Good Essays
  • Best Essays

    Velasco, V. (2000, November 21). Introduction to IP spoofing. SANS (SysAdmin, Audit, Network, Security) Institute. Retreieved from ttp://www.sans.org/reading_room/whitepapers/threats/introduction-ip-spoofing_959…

    • 4737 Words
    • 19 Pages
    Best Essays
  • Powerful Essays

    In other words best-practice security isn 't just good business sense; in some cases, it 's also the law. Legal requirements are vary between specific industries and different jurisdictions. For example, the Health Insurance Portability and Accountability…

    • 2543 Words
    • 11 Pages
    Powerful Essays
  • Powerful Essays

    Network Security Concepts

    • 1883 Words
    • 8 Pages

    Convery, S. (2004, June 18). General design considerations for secure networks. Retrieved on November 2, 2005 from http://www.ciscopress.com/…

    • 1883 Words
    • 8 Pages
    Powerful Essays
  • Better Essays

    Also, misused and unauthorized access to personal and private information has become a serious challenge in the digital world. Encryption is a classic and efficient method to solve these issues. However, traditional standard methods such as DES and AES are typically designed for textual information. Those methods due to certain characteristics such as large data and high correlation among pixels are not suitable for multimedia information…

    • 1090 Words
    • 5 Pages
    Better Essays

Related Topics