Tuesday,
May
11,
Tuesday,
May
11,
Steganography (Part 4, Usage and tools)
Posted by alsaboon at 8:46 AM 0 comments
Steganography can be used for many reasons, some good and some not. Good usage can include things like watermarking images (copyright protection) that they are overlaid in files, which appear to be part of the original file and are thus not easily detectable by the average person. IT also could be used as a way to make a substitute for a one-way hash value. Or it can be used to tag notes to online images (like post-it notes attached to paper files). Finally, Steganography can be used to maintain the confidentiality of valuable information, to protect the data from possible sabotage, theft, or unauthorized viewing.
Unfortunately, Steganography can also be used for illegitimate reasons. For instance, if someone was trying to steal data, they could conceal it in another file or files and send it out in an innocent looking email or file transfer. Furthermore, a person with a hobby of saving pornography, or worse, to their hard drive, may choose to hide the evidence through the use of Steganography. And, as was pointed out in the concern for terroristic purposes, it can be used as a means of covert communication. Of course, this can be both a legitimate and an illegitimate application.
Tools:
There are some tools for implementing the Steganography and in below some of them are available
Unfortunately, Steganography can also be used for illegitimate reasons. For instance, if someone was trying to steal data, they could conceal it in another file or files and send it out in an innocent looking email or file transfer. Furthermore, a person with a hobby of saving pornography, or worse, to their hard drive, may choose to hide the evidence through the use of Steganography. And, as was pointed out in the concern for terroristic purposes, it can be used as a means of covert communication. Of course, this can be both a legitimate and an illegitimate application.
Tools:
There are some tools for implementing the Steganography and in below some of them are available
Tuesday,
May
4,
Steganography (Part 3, Fundamentals)
Posted by alsaboon at 9:53 PM 0 comments
Steganography just hides the covert message and not the communicating with each parties. The Steganography process generally is putting a hidden message in some transport medium that is called the carrier. The secret message should be embedded in the carrier to form the Steganography medium. A Steganography key may be used for encryption of the hidden message. In summary:
Subscribe to:
Posts (Atom)