Steganography what your eyes can not see

Asst. Lec. Jinan N. Shehab

Is the art and science of writing hidden messages in such a way that no one other than the sender and recipient concerned can doubt the existence of the message, a type of confidentiality based on ambiguity. Throughout history, many techniques and ingenious methods have been used to hide secret information in various ways and ways. The Greeks shaved the heads of the apostles, tattooed the secret messages on the head, waiting for the hair to grow again, and once the hair grows, the message remains undetectable until it is shaved. Again when the recipient. In the Second World War, it offered invisible news and was also a common form of undetectable writing. A normal message can contain a very different message written between the lines. The first use of a log of the Steganography technique dates back to 440 BC when Herodotus cited two examples in his history. Demaritos sent a warning about a forthcoming attack on Greece by writing it directly on a wooden board and then covered it with a wax membrane. As a word, the first recording of the use of this term was in 1499 by Johannes Tristimus, in his article steganography on cryptography and hidden writing in the form of a book of magic spells.

The media used to hide data (Steganography)

The first introduction to modern steganography techniques was in 1985 with the advent of personal computers, and the problems of concealing traditional information were applied to them. The evolution that followed was slow, but since its inception, the size of the available steganography software has increased. The most prominent media used to hide information are four:

Text files, images, audio and video.

Patterns of data hiding

Pure Steganography: is the type or style of raw and raw patterns used to hide information, here is included information or hidden message within the mediator directly and without a password.

Secret Key Steganography: means hiding information using a key or password added to the hidden message when hidden within the target medium. Thus, the hidden message can not be retrieved or read by the other party except by knowing the secret word. By adding the password to the concealment process, the process is more secure and complex.

Public Key Steganography: It means hiding information using a public key. The process here is similar to the process used in encryption by using two keys. The first is a "public" key, used by the first person when the information is hidden, and the second "private" key is used by the recipient when retrieving the information Hidden, knowing that the private key has a direct relationship with the public key.

The method of hiding information is used in many useful applications such as the enhancement of smart tags. The method of hiding information plays an important role in concealing specific details within individuals' images, as well as in networks in TCP / IP packets where a non-duplicate password is hidden or included within Image until the network traffic is analyzed for a particular user.


Leave A Reply

Your email address will not be published. Required fields are marked *