Exploring steganography: Seeing the unseen

被引:476
作者
Johnson, NF [1 ]
Jajodia, S [1 ]
机构
[1] George Mason Univ, Dept Informat & Software Syst Engn, Ctr Secur Informat Syst, Fairfax, VA 22030 USA
关键词
D O I
10.1109/MC.1998.4655281
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Steganography, derived from Greek, literally means "covered writing." This art of hiding information includes a vast array of secret communication methods that conceal a message's very existence. Steganography and cryptography are cousins in the spycraft family: Steganography hides the message so that it cannot be seen. Cryptography scrambles a message so that it cannot be understood. Digital image steganography and its derivatives are growing in use and application. Where cryptography and strong encryption are outlawed, steganography can circumvent such policies to pass messages covertly. Commercial applications of steganography-digital watermarks and digital fingerprinting-are now being used to track the copyright and ownership of electronic media. Development in covert communications and steganography will continue, as will research in building more robust digital watermarks that can survive image manipulation and attacks. The more information that is made available on the Internet, the more owners of such information need to protect themselves from theft and false representation. In this article the authors discuss image files and how to hide information in them. To determine the limitations and flexibility of available software, they evaluated several steganographic packages. This article discusses three: Stego-Dos, White Noise Storm, and S-Tools for Windows.
引用
收藏
页码:26 / +
页数:10
相关论文
共 15 条
  • [1] AURA T, 1995, EET 1995
  • [2] Techniques for data hiding
    Bender, W
    Gruhl, D
    Morimoto, N
    Lu, A
    [J]. IBM SYSTEMS JOURNAL, 1996, 35 (3-4) : 313 - 336
  • [3] BRASSILET J, 1995, P INF 95
  • [4] BROWN A, 1994, S TOOLS WINDOWS
  • [5] BROWN W, 1995, GRAPHICS FILE FORMAT
  • [6] COX IJ, 1995, 9510 NEC RES I
  • [7] COX IJ, 1996, LECT NOTES COMPUTER, V1174, P185
  • [8] Kahn D., 1967, CODEBREAKERS
  • [9] Koch E., 1994, P INT C DIG MED EL P
  • [10] Kurak C., 1992, Proceedings. Eighth Annual Computer Security Applications Conference (Cat. No.92TH0470-5), P153, DOI 10.1109/CSAC.1992.228224