Steganography and its implications for security

Assignment Help Basic Computer Science
Reference no: EM133197814 , Length: 2 Pages

Refer to "Steganography and Its Implications for Security"

What Is Steganography?

The art of steganography is an old practice but the science of it comes to fruition in the computer age. For centuries people have concealed information from view using various methods, and computers make the concealment methods more sophisticated.

Basic elements of system steganography include:

? Secret message (information to conceal)

? Embedding algorithm (method for concealing the information)

? Carrier medium (unsuspecting document, image, audio, or video file)

The intent is to store and/or transmit secret messages hidden in an innocuous carrier medium. Good steganography is imperceptible: it doesn't significantly distort or degrade the quality of the carrier medium. For example, it's possible to disguise a secret message entirely within spam email such that it reads like any other bogus email without revealing any secrets.

The capacity for concealed data is confined to the type of message and the carrier medium. Given a large enough audio or video file any amount of secret data can be stashed away. Robustness, the ability to survive manipulation of the medium to modify embedded data, depends on the method and algorithm.

Steganography is used in conjunction with cryptography for dual-layer protection. For a third layer, a technique called chaffing and winnowing is used, which is a method of interleaving bogus data between slices of real data to avoid reassembly by undesired parties. Steganography, cryptography, and chaffing and winnowing are combined to construct messages such that no third-party can identify the original message. Imagine the following implications:

? Data concealment by encrypted or randomized data

? Concealment in tampered executable files

? Covert channels in system processes and network protocols

? Plaintext messages hidden in other plaintext messages

Detection requires careful inspection and thorough examination called steganalysis, the detection of stenographical encoded messages. Sometimes messages can be revealed by comparing original and modified forms (text files, executables) where possible. Otherwise, embedding data leaves statistical anomalies or artifacts that are detectable by "binary similarity measures".

Write a summary report on the significance of steganography and how it affects security and forensic investigations.

Reference no: EM133197814

Questions Cloud

Comprehensive understanding of operating systems theories : Write a paper to demonstrate a comprehensive understanding of Operating Systems theories.
Anticybersquatting Consumer Protection Act : What is the purpose of the Anticybersquatting Consumer Protection Act of 1999?
Discuss relevant issue regarding Encryption : Monroe College-Discuss a relevant issue regarding Access Controls. Discuss a relevant issue regarding Encryption.
How can company protect trade secrets : How can a company protect trade secrets? Please provide and discuss an example.Discussion
Steganography and its implications for security : The art of steganography is an old practice but the science of it comes to fruition in the computer age.
History of caesar cypher and its impact on cryptography : Jawaharlal Nehru Technological University-Analyze the history of Caesar Cypher and its impact on cryptography.
Describe encryption mechanism of bitcoin : Describe the encryption mechanism of bitcoin. In your opinion, can other encryption methods work better and if so, what would they look like?
Knowledge discovery in databases : We focus on the introductory chapter in which we review data mining and the key components of data mining.
Opposing perspectives of different technologies : Orange County Community College-Take into consideration the opposing perspectives of different technologies, Identify the opposing perspective you have chosen.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd