Stenography

1468 Words3 Pages

INTRO

The growing popularity of the Internet and multimedia methods have sparked an ever increasing interest in hiding data [with] in digital media (Wang). Many of the methods that have been used to protect copyrighted materials such as audio, video, images, and text, have focused primarily on watermarking. However embedding data within data has also proved useful for concealed communication, or stegonagraphy. This paper will address in further detail what stegonagraphy is, and the various techniques that are utilized.

BASIC UNDERSTANDING

Stegonagraphy is a form of hidden communication that literally means covered writing (Niklasson). The message itself is left in plain view for all to see, but goes unnoticed because the very existence of there even being a message is secret. One popular expression used to describe this method is hidden in plain sight, experts refer to this as Security through Obscurity (Duraiswamy). This is of course in distinction to cryptography where the message is actually scrambled, and the data left virtually unintelligible (encryption) to the eavesdropper even though the existence of a message is often times known beforehand.

It is also important to note that watermarking and stegonagraphy differ as well. Stegonagraphic information must never be evident to a viewer unaware of its presence. Modern stegonagraphy should only be detectable if secret information is known i.e. a secret key, whereas this key feature is optional when referring to watermarking.

Also compared to watermarking, stegonagraphy has drawn less attention until recently, as computer specialists, signal-processing researchers, and multimedia product vendors concerned about information security have recognized that illicit use of th...

... middle of paper ...

...ient, and goes right to the heart of steganography's literal meaning of covered writing (Niklasson).

Works Cited

Duraiswamy, Dr.K. "SECURITY THROUGH OBSCURITY." Infosec Writers. N.p.,

n.d.

Web. 17 Mar 2011.

. Kipper, Greg. Investigator's Guide to Stegonagraphy. Auerbach

Publications, © 2004. Books24x7. Web. Mar. 17, 2011.

http://common.books24x7.com.ezproxy2.lib.depaul.edu/book/id_7366/book.a

sp

McKevitt, Paul, et al. "Digital image stegonagraphy: Survey and

analysis of

current methods." Signal Processing 90.3 (2010): 727-752. Academic

Search

Premier. EBSCO. Web. 17 Mar. 2011. Niklasson, Hans . "Semagrams."

wbStego.

WbStego, 01 Mar. 2004. Web. 17 Mar 2011.

. Wang, Huaiqing, and Shuozhong

Wang. "Cyber Warfare: Stegonagraphy vs. Steganalysis." Communications

of

the ACM 47.10 (2004): 76-82. Academic Search Premier. EBSCO. Web. 17

Mar.

2011.

More about Stenography

Open Document