Essay on Steganography Analysis : Steganography And Cryptography

Essay on Steganography Analysis : Steganography And Cryptography

Length: 1266 words (3.6 double-spaced pages)

Rating: Better Essays

Open Document

Essay Preview

Steganography has been utilized as a part of different structures for a long time. It has discovered use in differently in military, conciliatory, individual and licensed innovation applications. Quickly expressed, steganography is the term connected to any number of procedures that will conceal a message inside an item, where the shrouded message won 't be clear to an eyewitness. This paper will investigate steganography from its most punctual occurrences through potential future application. Steganography, originating from the Greek words steganos, which means rooftop or secured and graphic which implies composing, is the workmanship and art of concealing the way that correspondence is occurring. Utilizing steganography, you can insert a mystery message inside a bit of unsuspicious data and send it without anybody knowing of the presence of the mystery message. Steganography and cryptography are firmly related. Cryptography scrambles messages so they can 't be caught on. Steganography then again, will shroud the message so there is no learning of the presence of the message in any case. The same is legitimate for good stenographic frameworks: learning of the framework that is utilized, ought not to give any data about the presence of concealed messages. Finding a message ought to just be conceivable with learning of the key that is required to reveal it.
Explanation:
Steganography has been in presence for a long time or for whatever length of time that men can speak with another. Steganography procedures have been utilized for a considerable length of time. The primary known application goes back to the old Greek times, when delivery person 's tattooed messages on their shaved heads and after that give their hair a chance to dev...


... middle of paper ...


...ubsequent stego medium 's factual properties." ("Hide and Seek: An Introduction Overview to Steganography,"32)
Along these lines, it could be concluded that in present day steganography, the entire procedure would just be considered fruitful if the general population, who shouldn 't see the message, couldn 't discover any hint of the message. Some may say no mystery stays mystery everlastingly and there will dependably be something that remaining parts as a confirmation or a piece of information. Be that as it may, for the general population behind cutting edge steganography, these convictions ought to be broken and rejected. Then again, Provos and Honeyman additionally said that current steganography must have the capacity to conform to three essential prerequisites so as the procedure could be effective. These three necessities are limit, security and heartiness.

Need Writing Help?

Get feedback on grammar, clarity, concision and logic instantly.

Check your paper »

Cryptography Essay

- Cryptography is such a broad part of our lives we do not even notice the smallest applications, shopping on eBay or watching satellite television. I bet you even used cryptology when you were in school and did not even know it. Ever write a message in numbers instead of letters. Each letter of the alphabet correlated to its number position in the alphabet. The number sequence 3,16,25,12,20,15,12,15,7,25 equals cryptology. This is a form of cryptology in its most basic form. Webster's dictionary defines Cryptography as : n. 1. The act or art of writing in code or secret characters; also, secret characters, codes or ciphers, or messages written in a secret code....   [tags: Data Encryption]

Better Essays
1922 words (5.5 pages)

Secure Data Transmission Using Steganography Essays

- Introduction : These days internet is being used by people of different walks of life, who are facing more challenges in terms of data storage and transmission which in turn increases number of users in the network thereby considerably. In the advanced world, information is more essential of workstation interchanges and heart of worldwide economy. To guarantee the security of information, the idea of concealing has pulled in individuals to present an imaginative and innovative answers for secure information from falling into wrong hands....   [tags: cryptography, strategies]

Better Essays
2018 words (5.8 pages)

Essay about Steganography

- 1. Introduction Steganography conceals the fact that a message is being sent. It is a method akin to covert channels, spread spectrum communication and invisible inks which adds another step in security. A message in ciphertext may arouse suspicion while an invisible message will not. 1.1 Purpose of Paper This paper introduces steganography by explaining what it is, providing a brief history with illustrations of some methods for implementing steganography, and comparing available software providing steganographic services....   [tags: Descriptive Steganography]

Free Essays
1641 words (4.7 pages)

Annotated Bibliography On The Cryptography Essay examples

- Assignment 1 Topics All of the three assessment items listed above will use only one topic. This will be allocated from the following: 1) Robotics 2) Human Computer Interface 3) Artificial Intelligence 4) Cryptography 5) Cybercrime CRYPTOGRAPHY: Secrets of writing codes. MIND MAP OF CRYPTOGRAPHY: My sub-topic is cryptography secrets symmetric, asymmetric key and digital signature as well. Websites Website Title: AN OVERVIEW OF CRYPTOGRAHY Author: Garry c.Kessler URL: http://www.garykessler.net/library/crypto.html Date accessed: 2/12/2015 Publication: september1998 Updated last year: 8 July 2015 Content of site Firstly I would like to say all the information in this websi...   [tags: Cryptography, Public-key cryptography]

Better Essays
1246 words (3.6 pages)

Cryptography : The Past, Present And Future Essay examples

- Cryptography: the Past, Present and Future The idea of cryptography has been in existence since 1900 BC with the use of inscriptions on the tomb of Khnumhotep II, in Egypt (Red Hat). Ever since that time, the uses and methods have changed, but the overall idea of transferring information in a secret and efficient manner has been the driving force for faster and safer data transfer. This paper will define cryptography, discuss its long history, current trends and the future of the complex electronic security technology....   [tags: Cryptography, Cipher, RSA, Key]

Better Essays
1120 words (3.2 pages)

Cryptography and Basic Security Goals Essay

- Information security plays a central role in the deployment of modern communication systems. The most important objectives of information security are authentication, confidentiality, data integrity and non-repudiation. Confidentiality ensures that information is accessible only to those authorized to have access. Authentication is the process proving the identity that assures the communicating entity is the one that it claimed to be, this means that the user or the system can prove their own identities to other parties who don’t have personal knowledge of their identities....   [tags: information security, cryptography, data]

Better Essays
907 words (2.6 pages)

A Closer Look At Cryptography Essay

- A Closer Look At Cryptography Ever since the earliest days of writing, people have had reasons to limit their information to a restricted group of people. Because of this, these people have had to develop ideas of making their information unable to be read by unwanted people. The general techniques used to hide the meaning of messages constitute the study known as cryptography. "Ciphers, in general fall into three major classifications: 1. Concealment Cipher, 2. Transposition Cipher, and 3. Substitution Cipher" (4)....   [tags: Writing Cryptography History Papers]

Better Essays
2016 words (5.8 pages)

Essay on Cryptography

- 2.1 Introduction Cryptography is an interesting field in the world of computer security. This has been boosted by the increase in computer attacks emanating from the Internet. With large and confidential data being transferred over the Internet, its security must be addressed. It is because of this that encryption techniques are continually evolving. With computer hackers being IT experts who are hungry to get at personal data on the Internet, IT security experts have also made sure that they come up with products to combat and stay ahead of the hackers....   [tags: Information Technology]

Better Essays
823 words (2.4 pages)

Quantum Cryptography Essay

- Quantum Cryptography Keeping secrets and passing information that is undetected has long been the goal of cryptographers. Codes have been written and then broken keeping cryptographers in constant search for the unbreakable code. Until recently, that goal seemed unreachable; however, a solution to the once impossible question seems to have surfaced. Quantum cryptography delves down into the world of very small particles, where there are entirely new ways of building ciphers. ("Arrives" 2) Quantum cryptography is a relatively recent discovery in the world of cryptography and is still being tested by the government for distance and practicality....   [tags: Codes Cryptography Symbols Essays]

Better Essays
978 words (2.8 pages)

Steganography Essay

- Steganography Introduction to Steganography Codes have been around for centuries ranging from wax, invisible ink, Morse code, the Enigma used by the Germans during World War II and now steganographic. Steganography is the latest form to insidiously hide information over the Internet without a trace of a file being altered. You are able to hide messages within images, voice or music. Steganography is an ancient method of hiding messages. Today messages are hidden in images and music. Steganography can be traced back to the ancient Greek who would write messages on tablets and cover them in wax....   [tags: Essays Papers]

Free Essays
898 words (2.6 pages)