Steganography and its implications for security

Assignment Help Basic Computer Science
Reference no: EM133197814 , Length: 2 Pages

Refer to "Steganography and Its Implications for Security"

What Is Steganography?

The art of steganography is an old practice but the science of it comes to fruition in the computer age. For centuries people have concealed information from view using various methods, and computers make the concealment methods more sophisticated.

Basic elements of system steganography include:

? Secret message (information to conceal)

? Embedding algorithm (method for concealing the information)

? Carrier medium (unsuspecting document, image, audio, or video file)

The intent is to store and/or transmit secret messages hidden in an innocuous carrier medium. Good steganography is imperceptible: it doesn't significantly distort or degrade the quality of the carrier medium. For example, it's possible to disguise a secret message entirely within spam email such that it reads like any other bogus email without revealing any secrets.

The capacity for concealed data is confined to the type of message and the carrier medium. Given a large enough audio or video file any amount of secret data can be stashed away. Robustness, the ability to survive manipulation of the medium to modify embedded data, depends on the method and algorithm.

Steganography is used in conjunction with cryptography for dual-layer protection. For a third layer, a technique called chaffing and winnowing is used, which is a method of interleaving bogus data between slices of real data to avoid reassembly by undesired parties. Steganography, cryptography, and chaffing and winnowing are combined to construct messages such that no third-party can identify the original message. Imagine the following implications:

? Data concealment by encrypted or randomized data

? Concealment in tampered executable files

? Covert channels in system processes and network protocols

? Plaintext messages hidden in other plaintext messages

Detection requires careful inspection and thorough examination called steganalysis, the detection of stenographical encoded messages. Sometimes messages can be revealed by comparing original and modified forms (text files, executables) where possible. Otherwise, embedding data leaves statistical anomalies or artifacts that are detectable by "binary similarity measures".

Write a summary report on the significance of steganography and how it affects security and forensic investigations.

Reference no: EM133197814

Questions Cloud

Comprehensive understanding of operating systems theories : Write a paper to demonstrate a comprehensive understanding of Operating Systems theories.
Anticybersquatting Consumer Protection Act : What is the purpose of the Anticybersquatting Consumer Protection Act of 1999?
Discuss relevant issue regarding Encryption : Monroe College-Discuss a relevant issue regarding Access Controls. Discuss a relevant issue regarding Encryption.
How can company protect trade secrets : How can a company protect trade secrets? Please provide and discuss an example.Discussion
Steganography and its implications for security : The art of steganography is an old practice but the science of it comes to fruition in the computer age.
History of caesar cypher and its impact on cryptography : Jawaharlal Nehru Technological University-Analyze the history of Caesar Cypher and its impact on cryptography.
Describe encryption mechanism of bitcoin : Describe the encryption mechanism of bitcoin. In your opinion, can other encryption methods work better and if so, what would they look like?
Knowledge discovery in databases : We focus on the introductory chapter in which we review data mining and the key components of data mining.
Opposing perspectives of different technologies : Orange County Community College-Take into consideration the opposing perspectives of different technologies, Identify the opposing perspective you have chosen.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Find firm x profit maximizing price

Use the mark-up formula to find Firm X's profit maximizing price.

  Which customers order and reorder wet food

Which customers order and reorder the wet food, and when are they likely to try it?

  Specializes in enterprise resource planning

You are a consultant that specializes in Enterprise Resource Planning (ERP). You have been hired by a small start-up manufacturing company,

  Why is it difficult to use project management software well

Why do you believe schedule issues often cause the most conflicts on projects? Why is it difficult to use project management software well?

  Find criminal case that involved Digital Forensics

Find criminal case that involved Digital Forensics. Describing the case and the how digital forensics were used in the investigation

  Prepare contingency planning document

Assume that you have been hired by a small veterinary practice to help them prepare a contingency planning document.

  Significance level for the goodness of fit test

What if they don't give us a significance level for the goodness of fit test do we choose one?

  Describe the enterprise, in terms of its operations

Illustrate how its e-commerce or ERP implementation integrated with related ICT (information and communication technologies- data mining, business intelligences, data ware house, databases, internet, RFID, VAN, EDI) ?

  Manager of a business that cleans airliners

You are the manager of a business that cleans airliners. You are contracted by airlines to perform quick cleanups on planes between flights as well as more extensive cleanings while planes are parked overnight. The airline industry is facing finan..

  Compare and contrast the loosely coupled architecture

Compare and contrast the loosely coupled architecture to a tightly coupled architecture in terms of TCO, maintenance, and implementation issues.

  Use the random class to randomly fill array list1

Use the Random class to randomly fill array list1 and then copy that array to list2 and list3. Use of the int data type is preferred.

  Calculate the transmission efficiency of protocol

Determine the effective data rate of sending these characters over the circuit using the above-defined protocol.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd