Preview

Steganography Research Paper

Better Essays
Open Document
Open Document
789 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Steganography Research Paper
Steganography: The Modern Day Invisible Ink
Liza Bowlin
CINT 106
Professor Carole Bachmann
Ivy Tech Community College of Indiana

As a child, were you intrigued by the idea of sending a secret message to your best friend? Perhaps you were fascinated by the thought of using an invisible ink pen. If so, then I suggest learning about steganography. According to the online Free Merriam-Webster Dictionary, the definition of steganography is the art or practice of concealing a message, image, or file within another message, image, or file (Merriam-Webster, 2011). People can use many different techniques for steganography, using it for a variety of reasons. Steganography has been used for many years in forms such
…show more content…

Governments may want to use it to for covert missions. They can let their troops in a different area know what the next move should be in a war. Criminals might also use steganography. Some people think that steganography may have been a tool used by the people that planned the attacks on 9-11. Also, some people think there may have been hidden messages in the videos that were circulating that Osama bin Laden appeared in (Kessler, 2001). Appallingly, child pornographers may use steganography to hide files. A positive use for steganography would be for artists and photographers who want to make sure their copyrighted materials do not get stolen is to add a watermark to their …show more content…

Steganalysis is the art of detecting and breaking steganography (Kessler, 2001). One such program is StegDetect, created by Niels Provos. This program will only detect data in JPG files, making it extremely limited (Steganography, 2001). There is also a website that can help detect isolated examples at www.guillermito2.net. With so many programs available to use to hide data, it makes it extremely difficult to detect the hidden data. The first step in steganography detection is to have suspicion that there is even a hidden message in the data at all. Next you need to find the right software to find the hidden message. And finally knowing the encryption algorithm used in the first place. As you can see, steganalysis is not an easy task.
The increase in the use of computers has made it extremely easy to send a secret message. Much easier than finding someone who will let you shave their head and tattoo their scalp! With so many options to hide a message, let us just hope that more people use it for the right reasons, rather than the wrong


You May Also Find These Documents Helpful

  • Powerful Essays

    Nt1310 Unit 7 Vocab Answers

    • 4516 Words
    • 19 Pages

    Steganography is task of hiding information by putting messages within one another. Whereas, cryptography is when you change information into an illegible layout. this format is called cipher text.…

    • 4516 Words
    • 19 Pages
    Powerful Essays
  • Good Essays

    In 1892, Francisca Rojas was found with intense neck injuries while her two sons were found with their throats cut open and dead. Francisca Rojas fanatically accused her neighbor who, under extreme interrogation, would not confess of committing murder and injuring Rojas’s neck. Inspector Alvarez, the head of the case, went to the crime scene and found a bloody fingerprint next to where the boys laid. After comparing the fingerprint to those of the neighbor, mother, sons, and other suspects, Alvarez deduced that it matched the mother’s right thumbprint. She then confessed to the murdering of her sons. The discovery of the print saved an innocent neighbor from harsh punishment. Fingerprints help solve crimes and save people's lives everyday. For that reason, it is important for people to understand fingerprints significance.…

    • 1226 Words
    • 5 Pages
    Good Essays
  • Good Essays

    There are many ways and methods by which a programmer can hide his code that is developed for commercial or personal use. .NET applications have a high cost and are susceptible to attacks by on unethical traders integrate market as stakes run high in hacking these codes. Thus, .NET Obfuscators play a vital role in protecting these programs. The Merriam-Webster dictionary defines Obfuscation as: to make obscure <obfuscate the issue>: confuse <obfuscate the reader>: To be evasive, unclear, or confusing. It also means to confuse or bewilder.…

    • 793 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    F. Working in the lettuce fields left Thompson physically drained, and he never did get good enough to keep up with la maquina, the machine that putters along the rows driving the pace of the crews.…

    • 386 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    20110616163506944

    • 1634 Words
    • 8 Pages

    Confidential or sensitive messages should be sent using a fast communication channel such as e-mail or instant messaging.…

    • 1634 Words
    • 8 Pages
    Good Essays
  • Good Essays

    SMS (or text messaging) is very popular. A study by OFCOM (who work in the UK communications industry) have found that in the UK in 2014 around 150 billion text messages were sent that year. Users are from all age groups, however it is most common in the 14-20 year old age category. On the apps you can use emoji’s to make it easier to express emotions and make it more like a face to face conversation. However messaging is causing a huge debate; some people love it but some loathe it. An article written by John Humphrey in the Daily mail called ‘I h8 txt msgs: How texting is wrecking our language’. However Graeme Patton form the Telegraph newspaper took a different view; his article was Text messaging 'improves children's spelling skills'…

    • 856 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Masks have held countless uses and meanings throughout history. Masks have been used in plays, like those of Shakespeare, traditional dances, social gatherings, even as a form of casual or corporal punishment. Although masks have several different uses in different cultural situations, the meaning of the masks is generally the same. Masks are used to conceal an appearance and assume the identity of another. Metaphorically, masks can be used to hide feelings, to protect oneself, and to block out the outside world. Many of these examples are shown in Art Speigelman 's Maus.…

    • 1127 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Text messaging- This feature enables you to send and receive text style messages, just like you would do on a mobile phone.…

    • 1360 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    1. Upon doing my own research, since I do not know anything about encryption, Ibelieve the technique used in encrypting this specific telegram is substitution. I came to this reasoning because transposition involves the positioning of the letters/numbers, such as columnar positioning and includes a more complicated order; steganography is when a hidden message is part of something else, like an image, article, in a list or other form of language. Stenography is intended to not attract attention to the message itself. The specific telegram we are looking at obviously looks coded and is not covert at all, that is how I ruled out stenography. I ruled out transposition because our telegram’s codes are positioned as if each set of numbers is a word. Then the signature at the end definitely leads me to believe it is the format of a letter.…

    • 287 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Text messaging, also referred to as SMS messaging, is a popular form of mediated, interpersonal communication that involves sending short messages to and from individual’s cell phones through a or cellular connection to converse with individuals at anyplace and anytime all over the world. Created in 1992 by Neil Papworth, an engineer for Vodaphone, a software company in England, the first text message was sent by Papworth to an executive of the company attending a Christmas party in a separate building; the message of the first ever text message simply read, “Merry Christmas”, it wouldn’t be until the next year that texting would be available to the general public (Peritz, 2012). So at mere 23 years old, Texting is one of the youngest mediums…

    • 1150 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Technology Synthesis Essay

    • 1003 Words
    • 5 Pages

    As technology grows the ways of communicating continue to become more effective. We have the ability to communicate through cell phones and the internet. The advancement in technology has invented the way of texting on a cell phone or using the social media on the internet. Lynne Truss, the author of The Joy of Texting, gives a great example of what texting is by saying “texting is a supremely secretive medium of communication-its like passing a note…” Using the example of passing a note is a great way of interpreting a text because no one knows what the text says and it…

    • 1003 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    - Even though many of our messages are not verbalized, we nonetheless send messages to others-intentionally and sometimes unintentionally…

    • 2155 Words
    • 9 Pages
    Powerful Essays
  • Powerful Essays

    Government Secrecy

    • 1363 Words
    • 6 Pages

    The federal government has a long history of making information secret. The marking of documents to indicate their protected status, confidential or secret, began as an informal practice in the early days of the federal government. It was an exercise carried over from…

    • 1363 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Technologies Impact

    • 820 Words
    • 4 Pages

    Cell phones have not only made it easier for people to communicate on the run but they have brought back a more technologically advanced version of the classic letter writing, text messaging. The introduction of text messaging into the society has been one of the baffling technological successes of our age, according to Gopnik. “Take texting, surely the most baffling technological success of our age”. Texting has almost…

    • 820 Words
    • 4 Pages
    Good Essays
  • Good Essays

    i. to make it easier for the students to look for the meaning of unfamiliar words.…

    • 942 Words
    • 4 Pages
    Good Essays

Related Topics