Steganography (nonfiction): Difference between revisions
No edit summary |
No edit summary |
||
Line 1: | Line 1: | ||
[[File:Steganography.png|thumb|The same image viewed by white, blue, green and red lights reveals different hidden numbers. | [[File:Steganography.png|thumb|The same image viewed by white, blue, green and red lights reveals different hidden numbers. | ||
Steganography (/ˌstɛɡəˈnɒɡrəfi/ (About this sound listen) STEG-ə-NOG-rə-fee) is the practice of concealing a file, message, image, or video within another file, message, image, or video. The word steganography combines the Greek words steganos (στεγανός), meaning "covered, concealed, or protected", and graphein (γράφειν) meaning "writing". | Steganography (/ˌstɛɡəˈnɒɡrəfi/ (About this sound listen) STEG-ə-NOG-rə-fee) is the practice of concealing a file, message, image, or video within another file, message, image, or video. The word ''steganography'' combines the Greek words ''steganos'' (στεγανός), meaning "covered, concealed, or protected", and ''graphein'' (γράφειν) meaning "writing". | ||
The first recorded use of the term was in 1499 by Johannes Trithemius in his | The first recorded use of the term was in 1499 by [[Johannes Trithemius (nonfiction)|Johannes Trithemius]] in his '''Steganography''' (STEG-ə-NOG-rə-fee) is the practice of concealing a file, message, image, or video within another file, message, image, or video. The word steganography combines the Greek words ''steganos'' (στεγανός), meaning "covered, concealed, or protected," and ''graphein'' (γράφειν) meaning "writing". | ||
The first recorded use of the term was in 1499 by [[Johannes Trithemius (nonfiction)|Johannes Trithemius]] in his Steganographia, a treatise on cryptography and steganography, disguised as a book on magic. Generally, the hidden messages appear to be (or be part of) something else: images, articles, shopping lists, or some other cover text. For example, the hidden message may be in invisible ink between the visible lines of a private letter. Some implementations of steganography that lack a shared secret are forms of security through obscurity, and key-dependent steganographic schemes adhere to Kerckhoffs's principle. | The first recorded use of the term was in 1499 by [[Johannes Trithemius (nonfiction)|Johannes Trithemius]] in his Steganographia, a treatise on [[Cryptography (nonfiction)|cryptography]] and steganography, disguised as a book on magic. Generally, the hidden messages appear to be (or be part of) something else: images, articles, shopping lists, or some other cover text. For example, the hidden message may be in invisible ink between the visible lines of a private letter. Some implementations of steganography that lack a shared secret are forms of security through obscurity, and key-dependent steganographic schemes adhere to Kerckhoffs's principle. | ||
The advantage of steganography over cryptography alone is that the intended secret message does not attract attention to itself as an object of scrutiny. Plainly visible encrypted messages, no matter how unbreakable they are, arouse interest and may in themselves be incriminating in countries in which encryption is illegal. | The advantage of steganography over [[Cryptography (nonfiction)|cryptography]] alone is that the intended secret message does not attract attention to itself as an object of scrutiny. Plainly visible encrypted messages, no matter how unbreakable they are, arouse interest and may in themselves be incriminating in countries in which encryption is illegal. | ||
Whereas [[Cryptography (nonfiction)|cryptography]] is the practice of protecting the contents of a message alone, steganography is concerned with concealing the fact that a secret message is being sent as well as concealing the contents of the message. | Whereas [[Cryptography (nonfiction)|cryptography]] is the practice of protecting the contents of a message alone, steganography is concerned with concealing the fact that a secret message is being sent as well as concealing the contents of the message. | ||
Line 22: | Line 22: | ||
* [[Mathematics (nonfiction)]] | * [[Mathematics (nonfiction)]] | ||
* [[Oblivious transfer (nonfiction)]] - an oblivious transfer (OT) protocol is a protocol in which a sender transfers one of potentially many pieces of information to a receiver, but remains oblivious as to what piece (if any) has been transferred. | * [[Oblivious transfer (nonfiction)]] - an oblivious transfer (OT) protocol is a protocol in which a sender transfers one of potentially many pieces of information to a receiver, but remains oblivious as to what piece (if any) has been transferred. | ||
* [[Johannes Trithemius (nonfiction)]] | |||
External links: | External links: |
Revision as of 19:58, 6 November 2018
[[File:Steganography.png|thumb|The same image viewed by white, blue, green and red lights reveals different hidden numbers. Steganography (/ˌstɛɡəˈnɒɡrəfi/ (About this sound listen) STEG-ə-NOG-rə-fee) is the practice of concealing a file, message, image, or video within another file, message, image, or video. The word steganography combines the Greek words steganos (στεγανός), meaning "covered, concealed, or protected", and graphein (γράφειν) meaning "writing".
The first recorded use of the term was in 1499 by Johannes Trithemius in his Steganography (STEG-ə-NOG-rə-fee) is the practice of concealing a file, message, image, or video within another file, message, image, or video. The word steganography combines the Greek words steganos (στεγανός), meaning "covered, concealed, or protected," and graphein (γράφειν) meaning "writing".
The first recorded use of the term was in 1499 by Johannes Trithemius in his Steganographia, a treatise on cryptography and steganography, disguised as a book on magic. Generally, the hidden messages appear to be (or be part of) something else: images, articles, shopping lists, or some other cover text. For example, the hidden message may be in invisible ink between the visible lines of a private letter. Some implementations of steganography that lack a shared secret are forms of security through obscurity, and key-dependent steganographic schemes adhere to Kerckhoffs's principle.
The advantage of steganography over cryptography alone is that the intended secret message does not attract attention to itself as an object of scrutiny. Plainly visible encrypted messages, no matter how unbreakable they are, arouse interest and may in themselves be incriminating in countries in which encryption is illegal.
Whereas cryptography is the practice of protecting the contents of a message alone, steganography is concerned with concealing the fact that a secret message is being sent as well as concealing the contents of the message.
Steganography includes the concealment of information within computer files. In digital steganography, electronic communications may include steganographic coding inside of a transport layer, such as a document file, image file, program or protocol. Media files are ideal for steganographic transmission because of their large size. For example, a sender might start with an innocuous image file and adjust the color of every hundredth pixel to correspond to a letter in the alphabet. The change is so subtle that someone who is not specifically looking for it is unlikely to notice the change.
Fiction cross-reference
- Cryptographic numen - a numen (nonfiction) arising from cryptography.
- Casio + N = CasiNo
Nonfiction cross-reference
- Cryptography (nonfiction)
- Mathematics (nonfiction)
- Oblivious transfer (nonfiction) - an oblivious transfer (OT) protocol is a protocol in which a sender transfers one of potentially many pieces of information to a receiver, but remains oblivious as to what piece (if any) has been transferred.
- Johannes Trithemius (nonfiction)
External links:
- Steganography @ Wikipedia
- Encoding data in dubstep drops
- Steganographically hiding secret messages in fake fingerprints @ Boing Boing