Steganography-The Art of Hiding Data

Given the shear volume of data stored and transmitted electronically in the world today, it is no surprise that countless methods of protecting such data have evolved. One lesser-known but rapidly growing method is steganography, the art and science of hiding information so that it does not even appear to exist. Moreover, in an ideal world we would all be able to openly send encrypted email or files to each other with no fear of reprisals. However, there are often cases when this is not possible, either because you are working for a company that does not allow encrypted emails or perhaps the local government does not approve of encrypted communication. This is one of the cases where Steganography can help hide the encrypted messages, images, keys, secret data, etc. This paper discusses the purpose of steganography. Explains how steganography is related to cryptography as well as what it can and cannot be used for. It also discusses a brief history of steganography. In addition, some of the tools and software used in steganography are demonstrated and including some discussion of the most popular algorithms involved in these tools. This paper further explains the advantages and disadvantages, as well as, strengths and weaknesses in the use of steganography.

[1]  Cynthia E. Irvine,et al.  Surmounting the Effects of Lossy Compression on Steganography , 1996 .

[2]  Kefa Rabah A Review of RSA and Public-Key Cryptosystems , 2005 .

[3]  D. Kahn The codebreakers : the story of secret writing , 1968 .

[4]  Walter Bender,et al.  Techniques for Data Hiding , 1996, IBM Syst. J..

[5]  Ioannis Pitas,et al.  Robust audio watermarking in the time domain , 1998, 9th European Signal Processing Conference (EUSIPCO 1998).

[6]  Markus G. Kuhn,et al.  StegFS: A Steganographic File System for Linux , 1999, Information Hiding.

[7]  Walter Bender,et al.  Echo Hiding , 1996, Information Hiding.

[8]  R. Card,et al.  Design and Implementation of the Second Extended Filesystem , 2001 .

[9]  Sushil Jajodia,et al.  Exploring steganography: Seeing the unseen , 1998, Computer.

[10]  Ingo Stierand,et al.  Computer Based Steganography: How It Works and Why Therefore Any Restrictions on Cryptography Are Nonsense, at Best , 1996, Information Hiding.

[11]  Craig H. Rowland,et al.  Covert Channels in the TCP/IP Protocol Suite , 1997, First Monday.

[12]  John McHugh,et al.  A cautionary note on image downgrading , 1992, [1992] Proceedings Eighth Annual Computer Security Application Conference.

[13]  Adi Shamir,et al.  The Steganographic File System , 1998, Information Hiding.

[14]  Sushil Jajodia,et al.  Steganalysis of Images Created Using Current Steganography Software , 1998, Information Hiding.

[15]  Christoph Hänle,et al.  The “ Politehnica ” University of Timisoara Faculty of Automatics and Computers , 2022 .

[16]  Ton Kalker Watermark Estimation through Detector Observations , 1998 .

[17]  Steganography Steganography,et al.  An Analysis of Steganographic Techniques , 1998 .