Wait a second!
More handpicked essays just for you.
More handpicked essays just for you.
Thesis on steganography
Thesis on steganography
Thesis on steganography
Don’t take our word for it - see why 10 million students trust us with their essay needs.
Recommended: Thesis on steganography
Introduction
Steganography is the art of hiding or concealment of secret information within an ordinary message or file. The purpose is to hide the existence of this information from a third party so as to covertly pass messages along without being detected. (1)
Throughout this report, we will discuss what a digital forensics investigator should know in relation to Steganography in electronic communication. We will talk about the history of steganography and then discuss how steganography techniques works in comparison to cryptography and digital watermarking. We will then talk about two different types of image and audio steganography methods that can be used to conceal hidden information. These methods are Least Significant Bit Insertion (LSB) and Discrete Cosine Transform (DCT). We will then talk about a tool that can be used hide and extract hidden
…show more content…
The word dates back to the book, “Steganographia”, which was written in the 15th century by a German man named Johannes Trithemius. Trithemius was active in the Renaissance and worked on three books which were about magic. On the surface, these books are perceived to be written about magic but secretly, Trithemius had concealed encrypted Cryptographic and Steganographic information and in a way, Steganographia was actually a case of Steganography. (2,3)
The technique of Steganography first dates to ancient Greece. A man named Histiaeus, who was being held prisoner by King Darius, had shaved the heads of his most trusted slaves and tattooed messages upon their scalp. When their hair grew back, he would send them out on a mission to deliver these messages to the leader of Miletus, Aristagoras. As a result, a revolt began and he was released. This is the earliest known method of Steganography but over the last few centuries it has being used in a variety of ways.
Other evidence located within the grave consisted of a generic watch, two cigarette butts, a button, a washer and a shell casing. All of these could be analysed for finger prints and DNA. The cigarette butts would also show a serial number indicating the brand (shown in Figure 3), which can be useful if it is found a victim or offender smokes a particular type of cigarette.
Shakespeare used many literary devices throughout his history to create timeless classics. Much Ado About Nothing is no exception. He used things such as themes, symbols and motifs to create this effect. Masking is the prominent motif in Much Ado About Nothing. It is seen many times over in this play. There are two kinds of masking that Shakespeare used in Much Ado. One is literal masking, this where a character actually wears a mask during the play. This is seen several times. There is also another form of masking that was used in Much Ado About Nothing, this is literary masking and this is when characters hide and/or makeup plots to put into others heads for a benefit or a cause.
Back-masking is the process where a recording is normally recorded, but the message is embedded in the song in a way that if the record is played backwards there is some kind of message in the song. This means that the song can be played both forward and backwards and the song will have two different meanings. This process was made popular by the Beatles.
Stereotyping is something we go through in our daily lives. It happens every day and everywhere. I for one, am also guilty for this even though I don’t like to admit it. Stereotyping groups people; those groups are usually called by a name that doesn’t truly fit that particular gathering. Stereotypes influence people’s lives, feelings, and how individuals cooperate with each other in society. Surprisingly, this also happens in our criminal justice system. Society usually stereotypes a criminal by their race and class and this is shown in the examples like the movie, The Central Park 5, the article “Teaching Literature at the County Jail” and Brock Turner’s case.
Masks have been mentioned in Venetian history dating back to the thirteenth century. They are formed out of paper-mache and decorated with various paints, gems, feathers, and other decorations (Magic of Venezia Mask Story). The Venetian Republic was composed of intensive social and economic inequality, making for a unique culture. Such inequalities resulted in the use of masks for the purpose of concealing an individual’s identity. Venice, being such a small city, made it difficult to keep secrets but the use of the mask helped make it a bit easier. The masks served the social purpose of keeping all citize...
The criminal justice system has changed a lot since the good old days of the Wild West when pretty much anything was legal. Criminals were dealt with in any fashion the law enforcement saw fit. The science of catching criminals has evolved since these days. We are better at catching criminals than ever and we owe this advancement to forensic science. The development of forensic science has given us the important techniques of fingerprinting and DNA analysis. We can use these techniques to catch criminals, prove people's innocence, and keep track of inmates after they have been paroled. There are many different ways of solving crimes using forensic evidence. One of these ways is using blood spatter analysis; this is where the distribution and pattern of bloodstains is studied to find the nature of the event that caused the blood spatter. Many things go into the determination of the cause including: the effects of various types of physical forces on blood, the interaction between blood and the surfaces on which it falls, the location of the person shedding the blood, the location and actions of the assailant, and the movement of them both during the incident. Another common type of forensic evidence is trace evidence. This is commonly recovered from any number of items at a crime scene. These items can include carpet fibers, clothing fibers, or hair found in or around the crime scene. Hairs recovered from crime scenes can be used as an important source of DNA. Examination of material recovered from a victim's or suspect's clothing can allow association to be made between the victim and other people, places, or things involved in the investigation. DNA analysis is the most important part of forensic science. DNA evidence can come in many forms at the crime scene. Some of these forms include hair; bodily fluids recovered at the crime scene or on the victim's body, skin under the victim's fingernails, blood, and many others. This DNA can be the basis of someone's guilt or innocence; it has decided many cases in the twentieth century. As the times continue to change and the criminals get smarter we will always need to find new ways to catch them. Forensic science is the most advanced method yet, but is only the beginning. As the field of science grows so will the abilities of the
Media surveillance has been going on since the beginning of communication with people. Media has transformed from print, such as newspapers and books, to telephone calls and radio broadcasts to television and finally to the internet via email, blogs, and social media. Systems have been developed over time to search these sources for particular information that is determined by the industry using the software. The industry uses examined in this paper will include the uses by the healthcare industry, the corporate industry, and the government. (Sasaki, 2009)
Jost, Kenneth. "Examining Forensics." CQ Researcher Online. N.p., 17 July 2009. Web. 29 Apr. 2014. . How criminals can use photoshop to eliminate evidence
The second step, layering, is the first attempt to conceal or disguise the source of the ownership of the funds by creating complex layers of financial transactions designed to disguise the audit trail and provide anonymity. The purpose of layering is to disassociate the illegal moneys from the source of the crime by purposely creating a complex web of financial transactions aimed at concealing any audit trail as well as the source and ownership of the funds.
The use of computers in homes, schools, offices, and other places has increased in the past few years due to technological developments. As computers have become important components of modern communication, their increased use has also led to the emergence of computer crimes. Computer crimes basically involve the use of a computer system to carry out an illegal activity. In attempts to lessen the frequency and impact of computer crimes, law enforcement agencies use computer forensic to investigate these offenses. Actually, computer crimes are governed by specific laws and dealt with through conducting a computer forensic investigation (Easttom & Taylor, 2011, p.337). Notably, a computer forensic investigation is usually carried out through the use of computer forensic tools, which help in collection of evidence based on the specific offense.
Codes have been around for centuries ranging from wax, invisible ink, Morse code, the Enigma used by the Germans during World War II and now steganographic. Steganography is the latest form to insidiously hide information over the Internet without a trace of a file being altered. You are able to hide messages within images, voice or music. Steganography is an ancient method of hiding messages. Today messages are hidden in images and music. Steganography can be traced back to the ancient Greek who would write messages on tablets and cover them in wax. This made the tablets look blank and unsuspicious (Kolata, F4). Citizens of ancient civilizations would tattoo messages on their shaved heads. They would then let their hair grown in and travel across enemy lines to deliver the message (Seper, G1). During World War II the Allies placed a ban on flower deliveries with dates, crossword puzzles and even report cards (Kolata, F4) for fear of a message being hidden with in. Steganographers first alter their data by using encryption and then place the image into a pre-select image. Steganographers look for a piece of code that would be the least significant and look the least altered to the human eye (Kolata, F4), being as inconspicuousness and random as possible. This makes the messages undetectable unless you knew that there is a message hidden and you were able to crack the code.
What did they do ? Before we talk about it any further, we have to know some definitions that we use in digital forensics and digital evidence, not only two of them but the others too. This chapter will explain about it . Before we talk about it any further, we have to know the definition of what we are talking about. In the introduction we already know what digital forensic and digital evidence shortly are. In this chapter, we will more explore what they are, and some state that we found when we search about digital forensic and digital evidence. Computer forensics is a broad field and applied to the handling of crimes related to information technology. The goal of computer forensic is to securing and analyzing digital
Computer science is a vast field that includes nearly everything relating to computers. Everyday there is information transmitted all over the Internet. Pictures are uploaded, transactions are made on thousands of online retail websites, and banking transactions take place everyday on the Internet. All of these transactions have created a need for secure communications. People wish to keep things like banking, medical, and political information from the eyes of unwelcome parties. This has created a need for cryptography. Cryptography is the science or study of the techniques of secret writing, especially code and cipher systems, and is used by everyone from the average citizen to the government and military.
The internet allows people to communicate sensitive information, and if received in the wrong hands can cause many problems for that person. Cryptography is the study or science of techniques of secret writing and message hiding. Cryptography constitutes any method in which someone attempts to hide a message, or the meaning, in some medium. One specific element of cryptography is encryption, which hides the data or information by transforming it into undecipherable code. Encryption uses a specified key to perform the data transformation.