Steganography

:: 8 Works Cited
Length: 898 words (2.6 double-spaced pages)
Rating: Excellent
Open Document
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Text Preview

More ↓

Continue reading...

Open Document

Steganography

Introduction to Steganography

Codes have been around for centuries ranging from wax, invisible ink, Morse code, the Enigma used by the Germans during World War II and now steganographic. Steganography is the latest form to insidiously hide information over the Internet without a trace of a file being altered. You are able to hide messages within images, voice or music. Steganography is an ancient method of hiding messages. Today messages are hidden in images and music. Steganography can be traced back to the ancient Greek who would write messages on tablets and cover them in wax. This made the tablets look blank and unsuspicious (Kolata, F4). Citizens of ancient civilizations would tattoo messages on their shaved heads. They would then let their hair grown in and travel across enemy lines to deliver the message (Seper, G1). During World War II the Allies placed a ban on flower deliveries with dates, crossword puzzles and even report cards (Kolata, F4) for fear of a message being hidden with in. Steganographers first alter their data by using encryption and then place the image into a pre-select image. Steganographers look for a piece of code that would be the least significant and look the least altered to the human eye (Kolata, F4), being as inconspicuousness and random as possible. This makes the messages undetectable unless you knew that there is a message hidden and you were able to crack the code.

Hacking and Unhacking

Hackers and terrorists have been using this form of technology for years. The United States governmental officials had suspected an attack on the United States for a period of time and thought the information to be hidden using steganography. Anyone can use and get access to steganographic materials. It's easy to download on numerous sights and no software is required. It's an easy and cheap way to keep information secure and undetectable. The number of steganography sites has doubled in the past two years (Kolata, F4). The United States government is also trying to place restrictions on encryption methods to prevent another catastrophic attack in the world such as the World Trade Center attacks. By having access to a private key the government would have unlimited access to secure information and crack codes all for safety reasons (USA Today). A " private key" is needed to decode any steganographic messages. Images are made up from a combination of an abundant of pixels (tiny dots).

How to Cite this Page

MLA Citation:
"Steganography." 123HelpMe.com. 24 Oct 2017
    <http://www.123HelpMe.com/view.asp?id=41959>.
Title Length Color Rating  
Essay on Image Steganography Review - ... 1.3 Difference between cryptography and steganography Cryptography and steganography are technologies used for different purposes but have same objective i.e. to send the secret data in such a way that it is not readable by someone who is not the intend recipient. Cryptography changes the content of file in such a way that it cannot be readable while steganography hides the message in such a way that the observer does not realize that the message is exchange through the medium. When both the two technologies are used together then it is very much easy to perform secret communication [3]....   [tags: internet safety and security issues]
:: 6 Works Cited
1470 words
(4.2 pages)
Term Papers [preview]
Secure Data Transmission Using Steganography Essays - Introduction : These days internet is being used by people of different walks of life, who are facing more challenges in terms of data storage and transmission which in turn increases number of users in the network thereby considerably. In the advanced world, information is more essential of workstation interchanges and heart of worldwide economy. To guarantee the security of information, the idea of concealing has pulled in individuals to present an imaginative and innovative answers for secure information from falling into wrong hands....   [tags: cryptography, strategies]
:: 6 Works Cited
2018 words
(5.8 pages)
Term Papers [preview]
Secure Data Transmission Using Steganography Essay - ... often, Steganography and Cryptography are confounded in light of the fact that both are comparable in the way that they two are utilized to ensure essential and mystery data. The distinction between the two is that Steganography bargains secluded from everything data so it creates the impression that no data is stowed away whatsoever. On the off chance that an individual or persons sees the message that the data is covered up within he or she won't comprehend or don't have no clue that there is any concealed data, thusly the individual won't endeavor to decode the data....   [tags: cryptography, concealing messages] 2011 words
(5.7 pages)
Research Papers [preview]
Steganography Essay - Steganography Introduction to Steganography Codes have been around for centuries ranging from wax, invisible ink, Morse code, the Enigma used by the Germans during World War II and now steganographic. Steganography is the latest form to insidiously hide information over the Internet without a trace of a file being altered. You are able to hide messages within images, voice or music. Steganography is an ancient method of hiding messages. Today messages are hidden in images and music. Steganography can be traced back to the ancient Greek who would write messages on tablets and cover them in wax....   [tags: Essays Papers]
:: 8 Works Cited
898 words
(2.6 pages)
Strong Essays [preview]
Development of Control and Confidentiality for Database Management Systems - ... Some key features of this model included the notion of distributed authorization administration, dynamic grant and revoke command of authorizations, and the use of views for supporting content-based authorizations. Also, the initial format of familiar commands for grant and revoke of authorizations that are today part of the SQL standard. Next research proposals have extended this basic model with a variety of features, such as negative authorization, role-based and task based authorization temporal authorization, and context-aware authorization....   [tags: access, steganography, authorization] 883 words
(2.5 pages)
Better Essays [preview]
Security, Storage and Transmission of Electronic Digital Images Essay example - ... In this case we are focusing on India tea industries and main competitor for India tea industries is China, Sri Lanka and Kenya tea industries. For each competitor for India tea industries we will construct a profile, SWOT analysis and the strategies they currently use. CHINA TEA INDUSTRIES China is the main player in the tea industries world this is because china produced 38 percent of world tea production and beside that compare to other country china also used the most land to plant tea which is 1431300 hectares of land (Xiao 2011)....   [tags: internet, encryption, steganography] 2161 words
(6.2 pages)
Term Papers [preview]
Essay on Stenography - INTRO The growing popularity of the Internet and multimedia methods have sparked an ever increasing interest in hiding data [with] in digital media (Wang). Many of the methods that have been used to protect copyrighted materials such as audio, video, images, and text, have focused primarily on watermarking. However embedding data within data has also proved useful for concealed communication, or stegonagraphy. This paper will address in further detail what stegonagraphy is, and the various techniques that are utilized....   [tags: Language ]
:: 1 Works Cited
1468 words
(4.2 pages)
Powerful Essays [preview]
Uses of Covert Channels Essay - Uses of Covert Channels Various methods of hiding information have been used for centuries; but it has always been an issue of how to get the information to the designated individual securely without being intercepted or compromised. With the use of cryptography and encryption the information being delivered could be obscured so message preventing the message from being read in the event the message was able to be intercepted; to be able to read the message the receiving party would only be able to decipher the message using the corresponding decryption algorithm....   [tags: Information Technology] 2224 words
(6.4 pages)
Powerful Essays [preview]
What is Cryptography? Essay - I. What is Cryptography Cryptography is a secrecy technique where the users involved create an actual message but it is hidden in some way. One form of Cryptography is Steganography. This is another secrecy technique, a bit more ancient than cryptography itself. It has been used for thousands of years, but as a primitive form of secret messages. The word itself is a derivative of two Greek words: steganos means “covered” and graphein means to “write”. In ancient time, a man named Pliny the Elder used milk from a thitymallus plant as invisible ink....   [tags: Secrecy Technique, Sending Messages]
:: 13 Works Cited
2005 words
(5.7 pages)
Powerful Essays [preview]
An Overview of Watermarking Essay - It's no news to anyone that's reading this that the meteoric rise of the Internet in recent years has significantly increased the availability of all forms of media. Nowhere is this more obvious than in the realm of commercial musical recordings, where Napster and other internet-based distribution systems have made incredible volumes of musical content widely available, all without the consent of the music's originators. This situation, though, is not unique to the music industry, as photographers, filmmakers, and other content-originators all have the same problem to varying degrees....   [tags: Technology Media Essa]
:: 7 Works Cited
3114 words
(8.9 pages)
Strong Essays [preview]

Related Searches




Steganographers use these pixels within the same color scheme as the hidden image to send messages. Steganography messages can be next to impossible to spot without the concept of Steganalysis. Steganalysis combs through images looking for alterations in data patterns. Where to look is the key problem though. A plan to launch bombs could be hidden in the petals of a flower (Kolata, F4) and be completely unnoticeable to the naked eye. One of the problems with Steganalysis is that it looks for alterations in data patterns. One of the most popular formats for images is JPEG (Kolata, F4), which is naturally distorted. This makes it even harder to detect hidden messages. How do you detect altered data patterns in an image format that is naturally distorted?

Skipping over Security

Steganography is an effective way to avoid security regulations that are slowly beginning to plague the Internet. Al-Quaeda terrorist network groups are known to have hidden plans and images in pornographic sites. "Being the last place where most Muslims would look (Cohen)." The FBI will not disclose information on this matter however or how often terrorists use steganographic materials (Kolata, F1). Steganography is extremely dangerous during any point of time and location. It is difficult to do well and if done correctly it can be next to impossible to detect. Once the code has been broken or discovered who is sending the messages, it is easier to detect patterns that are being used and possibly who is sending the messages. Programs are also implanted into images with steganographic and are programmed to delete after a certain number of hits have taken place (Seper, G1). One way to monitor online activity if susceptive of unlawful doings is to acquire a warrant for an electric phone tap. This is a timely manner and difficult to do as you need evidence. In order to carry out a steganographic operation you need to select a key code and a series of web sites for the messages to be placed. If this process is at all altered the plan is ruined and a new one will need to be planned.

Conclusion

One of the reasons steganography is so effective is the manner of hiding communication among any number of people. This enables people to communicate directly with an individual without ever meeting or talking to them. Code writing is here to stay. Who would have though that an ancient civilizations method used to hide messages from their enemies would become a worldwide explosion over a millennium later.

Works Cited

Cohen, Adam. "When Terror Hides Online" Time. 12 November 2001. pg 53.

Kolata, Gina. "Veiled Messages of Terror May Lurk in Cyberspace" New York Times. 30 October 2001, section F1+.

Seper, Chris. "Medium hides the message" The Plain Dealer, (21 October 2001): G1.

Zhao, Jian. "Look, It's Not There" Byte. (January 1997): 22.

Zim, Herbert S. Codes and Secret Writing, William Morrow and Company: New York, 1948.

http://members.tripod.com/steganography/stego.html

http://www.msnbc.com/nodules/wtc/video/standalone.asp

http://www.usatoday.com/news/washdc/2001-02-05-terror-encryption.htm


Return to 123HelpMe.com