Only the intended recipient who knows what to look for and downloads the file will receive the real message by running it back through the same stego tool. Millions of people may look at that picture never knowing that it contains plans for a terrorist attack. He then runs the picture through a stego tool and then posts it to eBay as part of an auction. Imagine that instead of a porno file, a person takes a picture of something they are supposedly selling, say an automobile. Another possible scenario is that public auction sites like eBay and Amazon, Jabong etc might be good places to post these files. and foreign officials,’ terrorist groups are ‘hiding maps and photographs of terrorist targets and posting instructions for terrorist activities on sports chat rooms, pornographic bulletin boards and other Web sites.” This may sound difficult to do on the surface but in actuality is a simple and effective way to pass information. Many newspapers have reported that “according to nameless ‘U.S. There is also much speculation that these groups may be using technologies like encryption and steganography to help hid their communications Using image files to transfer information is the method that first comes to mind. Groups may be using the Internet to pass information using techniques including e-mail, chat rooms, bulletin boards and other web sites. The need to solve this problem has led to the development of steganography. This is particularly important in the case of confidential data. However, the safety and security of long-distance communication remains an issue. As a result, people can easily exchange information and distance is no longer a barrier to communication. In this modern era, computers and the internet are major communication media that connect different parts of the world as one global virtual world. To achieve this secrecy, the process of steganography hides data within an image, sound file, movie, for example, so that its existence is hidden from prying eyes For true secrecy, you don't want anyone to know you're sending a message at all. Though your code may be unbreakable, any hacker can look and see you've sent a message. For this, you use cryptography, and send a coded pile of gibberish that only the web site can decipher. Privacy is what you need when you use your credit card on the Internet - you don't want your number revealed to the public. ![]() While cryptography provides privacy, steganography is intended to provide secrecy. Even according to the survey terrorįor a definition of Steganography I will quote Bryan Clair since he has defined it very elegantly: Steganography is the dark cousin of cryptography, the use of codes. ![]() INTRODUCTION Steganography: What is it?įrom two Greek word steganos meaning “covered” and the other word graphie meaning “writing”. Index Terms- cryptography, Spam Mimic, S toolġ. ‘The Right Way’ to use steganography as a means of concealing information and the pitfalls to be wary of by outlining key points to consider when using steganography. Finally, the future scope & conclusion presents The paper explores the relationship with cryptography and how the two technologies differ. This is followed by technical discussions on how it works and what methods and tools are used in stegnography. Steganography is not only valid for images but it is valid for any digital media such as images, audio files, video files, and text files etc.This paper discusses the concepts behind steganography by exploring firstly what it is and how it has been used throughout in various aspects and Basics of Modern Steganography. International Journal of Scientific & Engineering Research, Volume 5, Issue 1, January-2014ġ693 Steganography & tools used for Steganography Manisha Saini, Gaurav SainiĪbstract- Steganography is the art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message, a form of security through obscurity. Steganography & tools used for Steganography
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |