Sunday, June 2, 2019

Steganography :: Essays Papers

SteganographyIntroduction to SteganographyCodes have been around for centuries ranging from wax, invisible ink, Morse code, the Enigma apply by the Germans during World War II and now steganographic. Steganography is the latest form to insidiously hide information over the Internet without a trace of a file being altered. You are able to hide cores within images, voice or music. Steganography is an ancient method of hiding messages. Today messages are surreptitious in images and music. Steganography can be traced back to the ancient Greek who would write messages on tablets and cover them in wax. This made the tablets look blank and unsuspicious (Kolata, F4). Citizens of ancient civilizations would stain messages on their shaved heads. They would then let their hair grown in and travel across enemy lines to deliver the message (Seper, G1). During World War II the Allies placed a ban on flower deliveries with dates, crossword puzzles and even report cards (Kolata, F4) for fear of a message being hidden with in. Steganographers first alter their data by using encryption and then place the image into a pre-select image. Steganographers look for a piece of code that would be the least significant and look the least altered to the human eye (Kolata, F4), being as inconspicuousness and random as possible. This makes the messages undetectable unless you knew that there is a message hidden and you were able to crack the code. Hacking and UnhackingHackers and terrorists have been using this form of technology for years. The United States political scienceal officials had suspected an attack on the United States for a extremity of time and thought the information to be hidden using steganography. Anyone can use and get access to steganographic materials. Its easy to download on numerous sights and no software is required. Its an easy and cheap way to keep information secure and undetectable. The number of steganography sites has doubled in the past two years (Kolata , F4). The United States government is also trying to place restrictions on encryption methods to prevent another catastrophic attack in the world such as the World pot Center attacks. By having access to a private key the government would have unlimited access to secure information and crack codes all for precaution reasons (USA Today). A private key is needed to decode any steganographic messages. Images are made up from a combination of an abundant of pixels (tiny dots).

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.