Steganography FAQ
#1

Steganography FAQ
[attachment=16146]

Introduction
Steganography is a subject which is rarely touched upon by most IT Security Enthusiasts.
Most people don't see Steganography has a potential threat, some people don't even know what
Steganography is.
With this FAQ I hope to answer any questions anyone may want to ask about Steganography,
and to educate people so they can understand what exactly Steganography is.
Is Steganography a potential threat? Well your about to find out.


What Is Steganography?
Steganography is the practice of hiding private or sensitive information within something that
appears to be nothing out of the usual.
Steganography is often confused with cryptology because the two are similar in the way that they
both are used to protect important information.
The difference between the two is that Steganography involves hiding information so it appears
that no information is hidden at all.
If a person or persons views the object that the information is hidden inside of he or she will have
no idea that there is any hidden information, therefore the person will not attempt to decrypt the
information.


Steganography Terms
Carrier File – A file which has hidden information inside of it.
Steganalysis – The process of detecting hidden information inside of a file.
Stego-Medium – The medium in which the information is hidden.
Redundant Bits – Pieces of information inside a file which can be overwritten or altered with out
damaging the file.
Payload – The information which is the be concealed.

History Of Steganography

Through out history Steganography has been used to secretly communicate information between
people.

Some examples of use of Steganography in past times are:
1. During World War 2 invisible ink was used to write information on pieces of paper so that the
paper appeared to the average person as just being blank pieces of paper.
Liquids such as urine, milk, vinegar and fruit juices were used, because when each one of these
substances are heated they darken and become visible to the human eye.

2. In Ancient Greece they used to select messengers and shave their head, they would then write
a message on their head. Once the message had been written the hair was allowed to grow back.
After the hair grew back the messenger was sent to deliver the message, the recipient would
shave off the messengers hair to see the secret message.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: zigbee faq, faq divorce, wireless security faq, embedded systems faq, faq in interview for hr, automatic braking system faq, faq about facebook,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  SECURE DATA TRANSMISSION USING STEGANOGRAPHY seminar paper 1 1,905 24-11-2012, 01:35 PM
Last Post: seminar details
  Audio Steganography Using Bit Modification Abstract seminar details 1 1,878 10-11-2012, 11:58 AM
Last Post: seminar details
  Stego Machine – Video Steganography using Modified LSB Algorithm seminar details 1 2,448 25-10-2012, 01:40 PM
Last Post: seminar details
  Image Steganography Schemes For Image Authentication And Verification seminar details 1 2,786 15-10-2012, 03:25 PM
Last Post: seminar details
  INFORMATION HIDING USING STEGANOGRAPHY seminar addict 0 712 21-01-2012, 04:50 PM
Last Post: seminar addict
  HIGH CAPACITY,LOSSLESS,SECURE IMAGE STEGANOGRAPHY USING WAVELETS seminar addict 0 879 20-01-2012, 12:18 PM
Last Post: seminar addict
  A Java Framework for Experimentation with Steganography seminar addict 0 562 17-01-2012, 11:35 AM
Last Post: seminar addict

Forum Jump: