Preview

Modern Steganography

Powerful Essays
Open Document
Open Document
1774 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Modern Steganography
Abstract
This paper introduces steganography, the art and science of hidden writing. The purpose of steganography is to hide the existence of a secret message from a third party. The most popular modern application of steganography involves concealing messages within least significant bits of image or sound files. Another application of modern steganography is a steganographic file system. Steganography is also used by some modern printers, where tiny yellow dots that contain encoded printer serial numbers, as well as other information, are added to each printed page.
I chose modern steganography as a topic for my course paper primarily because I have had an interest in the topic before, and would like to use this paper as an opportunity to expand my knowledge of steganographic techniques, especially in their modern applications. Introduction
Steganography is the art and science of hidden writing. The purpose of steganography is to hide the existence of a secret communication from a third party. Usually, a steganographic message will appear to be something else: a picture, an audio file, or some other message (the covertext). The advantage of steganography over cryptography alone is that steganographic message does not attract attention to communicating parties. An apparent encrypted message, no matter how unbreakable it is, can arouse suspicion and may in itself be incriminating. If suspicion is raised, then the goal of steganography is defeated. Since there is always a possibility that secret communication will be uncovered, steganography is often used together with cryptography. A steganographic message (the plaintext) is first encrypted by some modern encryption algorithms, and then a covertext is modified in some way to contain the encrypted message (the ciphertext), resulting in stegotext.
Digital Steganography
A typical digital steganographic encoder is presented on Figure 1. The message is the data that the sender wishes to remain

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Unit 8 Assignment

    • 380 Words
    • 2 Pages

    e. ____________________ is the use of an algorithm to scramble data into a format that can be read only by reversing the algorithm.…

    • 380 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Nt1310 Final Exam

    • 3599 Words
    • 15 Pages

    b. digital watermark (Incorrect. A digital watermark is used to identify proprietary data, but it does not protect privacy.)…

    • 3599 Words
    • 15 Pages
    Good Essays
  • Satisfactory Essays

    This can be illustrated by the process of Steganography and encryption using the operating system functions. Steganography is a method of hiding the presence of a message or a file inside another much larger file or message without the forensics knowing it is there in the first place (Westphal, 2003). It is a deliberate act of keeping a message or data hidden. One good example would be hiding pornographic images inside an image…

    • 257 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    What evidence is there in this scene that relates to the concept of dissembling (hiding…

    • 528 Words
    • 3 Pages
    Good Essays
  • Best Essays

    Digital Forensics

    • 1977 Words
    • 8 Pages

    This is only the tip of the iceberg and we are starting to realize that digital forensics plays a very important part in areas such as Corporations, law enforcement, network security, and information assurance. As digital forensics starts to encompass our daily lives, we should pay close attention in how certain techniques such as Network Forensics, Anti-forensics Techniques, Mobile Device Forensics, and File Carving are being adopted. I will explore the benefits of these four techniques and if they have added value to Information Assurance as it relates to Forensic Support. Or is there a real problem with the standardization of how data is collected and stored.…

    • 1977 Words
    • 8 Pages
    Best Essays
  • Good Essays

    The most common methods of obfuscation are numeric variance, character scrambling, nulling, aggregating, encoding, artificial data generating, and repeating of the character masking process (Magnabosco, 2009). These methods rely on functions that exist in the SQL system server.…

    • 684 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Steganalysis is the art of detecting and breaking steganography (Kessler, 2001). One such program is StegDetect, created by Niels Provos. This program will only detect data in JPG files, making it extremely limited (Steganography, 2001). There is also a website that can help detect isolated examples at www.guillermito2.net. With so many programs available to use to hide data, it makes it extremely difficult to detect the hidden data. The first step in steganography detection is to have suspicion that there is even a hidden message in the data at all. Next you need to find the right software to find the hidden message. And finally knowing the encryption algorithm used in the first place. As you can see, steganalysis is not an easy task.…

    • 789 Words
    • 4 Pages
    Better Essays
  • Powerful Essays

    Digital Forensics

    • 1724 Words
    • 7 Pages

    Even the best anti-virus programmes only mitigate known risks and attack-vectors. Therefore, a series of security-enforcing functions should always be built that are invisible to the user and enable forensic analysts to examine unknown code without risk to the integrity of the forensic laboratory.…

    • 1724 Words
    • 7 Pages
    Powerful Essays
  • Better Essays

    Computer forensics

    • 2184 Words
    • 8 Pages

    People who try to steal or seek other people 's personal information is growing rapidly in today 's society. Before we know it, a certain person may have access to your bank account ; before you know that your account is empty. You can access your e -mails ; before you know it your account will be hacked. Social networks to mobile phones ; People can even hide some things in images if they can certainly not be accessed. While we may delete files from our computer system, it does not leave your system immediately. Yes, it was removed but it is still floating around on your hard drive , making it easy for someone to easily recover the deleted file . This will include some different amount of information about how we can access hidden information , delete, copy information and hide some things in many ways . There will be discussions , explanations, tips, definitions and analytical critical information we need to know ; also accompanied by numerous screen shots of the work . Programs like Winhex , ProDiscover basic and SilentEye also play a monumental role in the report. Regarding the report , it will be in charge of anti- forensic techniques such as data hiding , wiping secure , encryption, file deletion, steganography and much more . After everything is done , then it will need a picture of the USB , so it can be further improved and used for activities and future tasks.…

    • 2184 Words
    • 8 Pages
    Better Essays
  • Better Essays

    created by vaporization of liquid which causes expansion of the liquid and therefore making a shock wave. Fireworks are also used in television quite frequently and have a lot of chemistry behind the scenes. This includes the different metals changing the color, the gunpowder to fuel the explosion, and finally the ingredients such as charcoal and potassium nitrate that are what make the reaction.…

    • 1626 Words
    • 7 Pages
    Better Essays
  • Powerful Essays

    4. Collberg, C., Thomborson, C., Low, D.: Manufacturing cheap, resilient, and stealthy opaque constructs. In: Conference on Principles…

    • 8999 Words
    • 36 Pages
    Powerful Essays
  • Good Essays

    Counterfeiting money is a big business for criminals. Nearly $70 million of fake currency gets used daily, costing consumers millions. In the present day, there are many new technologies that have been discovered and studied in order to help put counterfeiters out of business. Our currency is something that we must protect, which is why these technologies and discoveries are very important in the safety and development of our economy. The new generation of Philippine banknotes includes new and more advanced technology to ensure the safety of the genuine Philippine banknotes. This is to prevent money counterfeiting in our country. These new features include more advanced photo editing, which features micro printing on the different images and texts on the banknotes, a unique rough texture, a new system of serial numbering, advanced security fibers and security threads, watermark technology, and optically variable ink. These are the most advanced and efficient methods of preventing money counterfeiting today. Provided in this paper is a detailed explanation and description of each security precaution and a detailed review of the methods used to execute them.…

    • 1552 Words
    • 7 Pages
    Good Essays
  • Powerful Essays

    However, several cryptographic methods are available such as symmetric-key encryption, Caesar’s cipher and public key cryptography [2]. By using these methods several data encryption methods have been implemented.…

    • 3611 Words
    • 15 Pages
    Powerful Essays
  • Powerful Essays

    Cut and paste the cmd.exe file in desktop and rename this file from cmd.exe to sethc.exe…

    • 614 Words
    • 3 Pages
    Powerful Essays
  • Satisfactory Essays

    Invisible Technology

    • 467 Words
    • 2 Pages

    Invisibility has long been one of the marvels of science fiction and fantasy, from the pages of The Invisible Man, to the magic invisibility cloak of the Harry Potter books. Yet, this is actually a modern technology initiated from ancient magical or miraculous occurrence. Invisibility is the state of an object that cannot be seen which in nature this is known as transparency. Now, Japanese scientist has successfully invented a real functioning invisible cloak using the theory of mirage or often considered as supreme camouflage. How it works? A famous method used by scientist is a stone in a river technique, in which the water passes around it, but leaves no trace of a stone being in the water where the light waves pass around that object and bend the light on its surface, leaving no visible aspects of it, possibly not even a shadow.…

    • 467 Words
    • 2 Pages
    Satisfactory Essays

Related Topics