EXPLORING STEGANOGRAPHY - SEEING THE UNSEEN

Citation
Nf. Johnson et S. Jajodia, EXPLORING STEGANOGRAPHY - SEEING THE UNSEEN, Computer, 31(2), 1998, pp. 26
Citations number
15
Categorie Soggetti
Computer Science Software Graphycs Programming","Computer Science Hardware & Architecture","Computer Science Hardware & Architecture","Computer Science Software Graphycs Programming
Journal title
ISSN journal
00189162
Volume
31
Issue
2
Year of publication
1998
Database
ISI
SICI code
0018-9162(1998)31:2<26:ES-STU>2.0.ZU;2-R
Abstract
Steganography, derived from Greek, literally means ''covered writing.' ' This art of hiding information includes a vast array of secret commu nication methods that conceal a message's very existence. Steganograph y and cryptography are cousins in the spycraft family: Steganography h ides the message so that it cannot be seen. Cryptography scrambles a m essage so that it cannot be understood. Digital image steganography an d its derivatives are growing in use and application. Where cryptograp hy and strong encryption are outlawed, steganography can circumvent su ch policies to pass messages covertly. Commercial applications of steg anography-digital watermarks and digital fingerprinting-are now being used to track the copyright and ownership of electronic media. Develop ment in covert communications and steganography will continue, as will research in building more robust digital watermarks that can survive image manipulation and attacks. The more information that is made avai lable on the Internet, the more owners of such information need to pro tect themselves from theft and false representation. In this article t he authors discuss image files and how to hide information in them. To determine the limitations and flexibility of available software, they evaluated several steganographic packages. This article discusses thr ee: Stego-Dos, White Noise Storm, and S-Tools for Windows.