Steganography

:: 8 Works Cited
Length: 898 words (2.6 double-spaced pages)
Rating: Excellent
Open Document
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Text Preview

More ↓

Continue reading...

Open Document

Steganography

Introduction to Steganography

Codes have been around for centuries ranging from wax, invisible ink, Morse code, the Enigma used by the Germans during World War II and now steganographic. Steganography is the latest form to insidiously hide information over the Internet without a trace of a file being altered. You are able to hide messages within images, voice or music. Steganography is an ancient method of hiding messages. Today messages are hidden in images and music. Steganography can be traced back to the ancient Greek who would write messages on tablets and cover them in wax. This made the tablets look blank and unsuspicious (Kolata, F4). Citizens of ancient civilizations would tattoo messages on their shaved heads. They would then let their hair grown in and travel across enemy lines to deliver the message (Seper, G1). During World War II the Allies placed a ban on flower deliveries with dates, crossword puzzles and even report cards (Kolata, F4) for fear of a message being hidden with in. Steganographers first alter their data by using encryption and then place the image into a pre-select image. Steganographers look for a piece of code that would be the least significant and look the least altered to the human eye (Kolata, F4), being as inconspicuousness and random as possible. This makes the messages undetectable unless you knew that there is a message hidden and you were able to crack the code.

Hacking and Unhacking

Hackers and terrorists have been using this form of technology for years. The United States governmental officials had suspected an attack on the United States for a period of time and thought the information to be hidden using steganography. Anyone can use and get access to steganographic materials. It's easy to download on numerous sights and no software is required. It's an easy and cheap way to keep information secure and undetectable. The number of steganography sites has doubled in the past two years (Kolata, F4). The United States government is also trying to place restrictions on encryption methods to prevent another catastrophic attack in the world such as the World Trade Center attacks. By having access to a private key the government would have unlimited access to secure information and crack codes all for safety reasons (USA Today). A " private key" is needed to decode any steganographic messages. Images are made up from a combination of an abundant of pixels (tiny dots).

How to Cite this Page

MLA Citation:
"Steganography." 123HelpMe.com. 30 Apr 2017
    <http://www.123HelpMe.com/view.asp?id=41959>.
Title Length Color Rating  
Steganography Essay - Steganography Introduction to Steganography Codes have been around for centuries ranging from wax, invisible ink, Morse code, the Enigma used by the Germans during World War II and now steganographic. Steganography is the latest form to insidiously hide information over the Internet without a trace of a file being altered. You are able to hide messages within images, voice or music. Steganography is an ancient method of hiding messages. Today messages are hidden in images and music. Steganography can be traced back to the ancient Greek who would write messages on tablets and cover them in wax....   [tags: Essays Papers]
:: 8 Works Cited
898 words
(2.6 pages)
Strong Essays [preview]
Essay on Stenography - INTRO The growing popularity of the Internet and multimedia methods have sparked an ever increasing interest in hiding data [with] in digital media (Wang). Many of the methods that have been used to protect copyrighted materials such as audio, video, images, and text, have focused primarily on watermarking. However embedding data within data has also proved useful for concealed communication, or stegonagraphy. This paper will address in further detail what stegonagraphy is, and the various techniques that are utilized....   [tags: Language ]
:: 1 Works Cited
1468 words
(4.2 pages)
Powerful Essays [preview]
Uses of Covert Channels Essay - Uses of Covert Channels Various methods of hiding information have been used for centuries; but it has always been an issue of how to get the information to the designated individual securely without being intercepted or compromised. With the use of cryptography and encryption the information being delivered could be obscured so message preventing the message from being read in the event the message was able to be intercepted; to be able to read the message the receiving party would only be able to decipher the message using the corresponding decryption algorithm....   [tags: Information Technology] 2224 words
(6.4 pages)
Powerful Essays [preview]
What is Cryptography? Essay - I. What is Cryptography Cryptography is a secrecy technique where the users involved create an actual message but it is hidden in some way. One form of Cryptography is Steganography. This is another secrecy technique, a bit more ancient than cryptography itself. It has been used for thousands of years, but as a primitive form of secret messages. The word itself is a derivative of two Greek words: steganos means “covered” and graphein means to “write”. In ancient time, a man named Pliny the Elder used milk from a thitymallus plant as invisible ink....   [tags: Secrecy Technique, Sending Messages]
:: 13 Works Cited
2005 words
(5.7 pages)
Powerful Essays [preview]
Terrorists Use of Cryptography and Data Encryption Essay - A tactic that underpins terrorist group's success is to blend in with the local populace. Terrorists wear no distinguishable uniforms. Use false identities. Hide from view inside protected sanctuaries such as mosques. As stated by a leading researcher and scholar on internet use by terrorists, “With over 1.4 billion persons on the internet… it is not surprising to find terrorists among that population” (Denning 2010, 1). Terrorist groups use the internet and other modern technologies for various reasons....   [tags: encrypted communications]
:: 18 Works Cited
3207 words
(9.2 pages)
Research Papers [preview]
An Overview of Watermarking Essay - It's no news to anyone that's reading this that the meteoric rise of the Internet in recent years has significantly increased the availability of all forms of media. Nowhere is this more obvious than in the realm of commercial musical recordings, where Napster and other internet-based distribution systems have made incredible volumes of musical content widely available, all without the consent of the music's originators. This situation, though, is not unique to the music industry, as photographers, filmmakers, and other content-originators all have the same problem to varying degrees....   [tags: Technology Media Essa]
:: 7 Works Cited
3114 words
(8.9 pages)
Strong Essays [preview]
Statement of Purpose Essay - ... Due to these features, their device was selected by NASA for a space program, and was sent to the International Space Station. I think by using signal processing, we can reach the full potential of our technology, and achieve better results in areas like medical imaging, photography or signal compression, which intrigues me. Furthermore, the area of signal processing is challenging and it has many applications in real life, which motivates me even further. During my education in Bilkent University, I have taken many courses from very influential professors....   [tags: education, signals, images] 523 words
(1.5 pages)
Good Essays [preview]
Essay on Cryptography - 2.1 Introduction Cryptography is an interesting field in the world of computer security. This has been boosted by the increase in computer attacks emanating from the Internet. With large and confidential data being transferred over the Internet, its security must be addressed. It is because of this that encryption techniques are continually evolving. With computer hackers being IT experts who are hungry to get at personal data on the Internet, IT security experts have also made sure that they come up with products to combat and stay ahead of the hackers....   [tags: Information Technology] 823 words
(2.4 pages)
Better Essays [preview]
Empathic, Virtual, Real-Time Methodologies Essay - Empathic, Virtual, Real-Time Methodologies Symbiotic technology and thin clients have garnered improbable interest from both analysts and cyberinformaticians in the last several years. After years of typical research into superblocks, we disprove the synthesis of the UNIVAC computer, which embodies the intuitive principles of cryptography [18,16]. In order to overcome this grand challenge, we use empathic methodologies to disprove that e-business and linked lists can interfere to realize this goal....   [tags: essays research papers] 2288 words
(6.5 pages)
Strong Essays [preview]
Cryptography Essay - Cryptography is such a broad part of our lives we do not even notice the smallest applications, shopping on eBay or watching satellite television. I bet you even used cryptology when you were in school and did not even know it. Ever write a message in numbers instead of letters. Each letter of the alphabet correlated to its number position in the alphabet. The number sequence 3,16,25,12,20,15,12,15,7,25 equals cryptology. This is a form of cryptology in its most basic form. Webster's dictionary defines Cryptography as : n. 1. The act or art of writing in code or secret characters; also, secret characters, codes or ciphers, or messages written in a secret code....   [tags: Data Encryption]
:: 10 Works Cited
1922 words
(5.5 pages)
Powerful Essays [preview]

Related Searches




Steganographers use these pixels within the same color scheme as the hidden image to send messages. Steganography messages can be next to impossible to spot without the concept of Steganalysis. Steganalysis combs through images looking for alterations in data patterns. Where to look is the key problem though. A plan to launch bombs could be hidden in the petals of a flower (Kolata, F4) and be completely unnoticeable to the naked eye. One of the problems with Steganalysis is that it looks for alterations in data patterns. One of the most popular formats for images is JPEG (Kolata, F4), which is naturally distorted. This makes it even harder to detect hidden messages. How do you detect altered data patterns in an image format that is naturally distorted?

Skipping over Security

Steganography is an effective way to avoid security regulations that are slowly beginning to plague the Internet. Al-Quaeda terrorist network groups are known to have hidden plans and images in pornographic sites. "Being the last place where most Muslims would look (Cohen)." The FBI will not disclose information on this matter however or how often terrorists use steganographic materials (Kolata, F1). Steganography is extremely dangerous during any point of time and location. It is difficult to do well and if done correctly it can be next to impossible to detect. Once the code has been broken or discovered who is sending the messages, it is easier to detect patterns that are being used and possibly who is sending the messages. Programs are also implanted into images with steganographic and are programmed to delete after a certain number of hits have taken place (Seper, G1). One way to monitor online activity if susceptive of unlawful doings is to acquire a warrant for an electric phone tap. This is a timely manner and difficult to do as you need evidence. In order to carry out a steganographic operation you need to select a key code and a series of web sites for the messages to be placed. If this process is at all altered the plan is ruined and a new one will need to be planned.

Conclusion

One of the reasons steganography is so effective is the manner of hiding communication among any number of people. This enables people to communicate directly with an individual without ever meeting or talking to them. Code writing is here to stay. Who would have though that an ancient civilizations method used to hide messages from their enemies would become a worldwide explosion over a millennium later.

Works Cited

Cohen, Adam. "When Terror Hides Online" Time. 12 November 2001. pg 53.

Kolata, Gina. "Veiled Messages of Terror May Lurk in Cyberspace" New York Times. 30 October 2001, section F1+.

Seper, Chris. "Medium hides the message" The Plain Dealer, (21 October 2001): G1.

Zhao, Jian. "Look, It's Not There" Byte. (January 1997): 22.

Zim, Herbert S. Codes and Secret Writing, William Morrow and Company: New York, 1948.

http://members.tripod.com/steganography/stego.html

http://www.msnbc.com/nodules/wtc/video/standalone.asp

http://www.usatoday.com/news/washdc/2001-02-05-terror-encryption.htm


Return to 123HelpMe.com