Steganography (nonfiction): Difference between revisions
No edit summary |
No edit summary |
||
(7 intermediate revisions by the same user not shown) | |||
Line 1: | Line 1: | ||
[[File:Steganography.png|thumb|The same image viewed by white, blue, green and red lights reveals different hidden numbers. | [[File:Steganography.png|thumb|The same image viewed by white, blue, green and red lights reveals different hidden numbers.]]'''Steganography''' is the practice of concealing a file, message, image, or video within another file, message, image, or video. | ||
Steganography | |||
The | The word ''steganography'' combines the Greek words ''steganos'' (στεγανός), meaning "covered, concealed, or protected", and ''graphein'' (γράφειν) meaning "writing". | ||
The first recorded use of the term was in 1499 by [[Johannes Trithemius (nonfiction)|Johannes Trithemius]] in his | The first recorded use of the term was in 1499 by [[Johannes Trithemius (nonfiction)|Johannes Trithemius]] in his '''Steganography''' (STEG-ə-NOG-rə-fee) is the practice of concealing a file, message, image, or video within another file, message, image, or video. The word steganography combines the Greek words ''steganos'' (στεγανός), meaning "covered, concealed, or protected," and ''graphein'' (γράφειν) meaning "writing". | ||
The advantage of steganography over cryptography alone is that the intended secret message does not attract attention to itself as an object of scrutiny. Plainly visible encrypted messages, no matter how unbreakable they are, arouse interest and may in themselves be incriminating in countries in which encryption is illegal. | The first recorded use of the term was in 1499 by [[Johannes Trithemius (nonfiction)|Johannes Trithemius]] in his Steganographia, a treatise on [[Cryptography (nonfiction)|cryptography]] and steganography, disguised as a book on magic. Generally, the hidden messages appear to be (or be part of) something else: images, articles, shopping lists, or some other cover text. For example, the hidden message may be in invisible ink between the visible lines of a private letter. Some implementations of steganography that lack a shared secret are forms of security through obscurity, and key-dependent steganographic schemes adhere to [[Kerckhoffs's principle (nonfiction)|Kerckhoffs's principle]]. | ||
The advantage of steganography over [[Cryptography (nonfiction)|cryptography]] alone is that the intended secret message does not attract attention to itself as an object of scrutiny. Plainly visible encrypted messages, no matter how unbreakable they are, arouse interest and may in themselves be incriminating in countries in which encryption is illegal. | |||
Whereas [[Cryptography (nonfiction)|cryptography]] is the practice of protecting the contents of a message alone, steganography is concerned with concealing the fact that a secret message is being sent as well as concealing the contents of the message. | Whereas [[Cryptography (nonfiction)|cryptography]] is the practice of protecting the contents of a message alone, steganography is concerned with concealing the fact that a secret message is being sent as well as concealing the contents of the message. | ||
Steganography includes the concealment of information within computer files. In digital steganography, electronic communications may include steganographic coding inside of a transport layer, such as a document file, image file, program or protocol. Media files are ideal for steganographic transmission because of their large size. For example, a sender might start with an innocuous image file and adjust the color of every hundredth pixel to correspond to a letter in the alphabet. The change is so subtle that someone who is not specifically looking for it is unlikely to notice the change. | Steganography includes the concealment of information within computer files. In digital steganography, electronic communications may include steganographic coding inside of a transport layer, such as a document file, image file, program or protocol. Media files are ideal for steganographic transmission because of their large size. For example, a sender might start with an innocuous image file and adjust the color of every hundredth pixel to correspond to a letter in the alphabet. The change is so subtle that someone who is not specifically looking for it is unlikely to notice the change. | ||
== In the News == | |||
<gallery> | |||
File:Johannes Trithemius.jpg|link=Johannes Trithemius (nonfiction)|1484: Polymath [[Johannes Trithemius (nonfiction)|Johannes Trithemius]] publishes ''Chronicles of an Gnomon Algorithm Cryptographer'', for which he will be posthumously awarded the Pulitzer Prize. | |||
</gallery> | |||
== Fiction cross-reference == | == Fiction cross-reference == | ||
Line 16: | Line 23: | ||
* [[Cryptographic numen]] - a [[numen (nonfiction)]] arising from cryptography. | * [[Cryptographic numen]] - a [[numen (nonfiction)]] arising from cryptography. | ||
* [[Casio + N = CasiNo]] | * [[Casio + N = CasiNo]] | ||
* [[Ivan Steganog]] | |||
== Nonfiction cross-reference == | == Nonfiction cross-reference == | ||
* [[Cryptography (nonfiction)]] | * [[Cryptography (nonfiction)]] | ||
* [[Towards Construction Based Data Hiding: From Secrets to Fingerprint Images (nonfiction)]] | |||
* [[Mathematics (nonfiction)]] | * [[Mathematics (nonfiction)]] | ||
* [[Oblivious transfer (nonfiction)]] - an oblivious transfer (OT) protocol is a protocol in which a sender transfers one of potentially many pieces of information to a receiver, but remains oblivious as to what piece (if any) has been transferred. | * [[Oblivious transfer (nonfiction)]] - an oblivious transfer (OT) protocol is a protocol in which a sender transfers one of potentially many pieces of information to a receiver, but remains oblivious as to what piece (if any) has been transferred. | ||
* [[Towards Construction Based Data Hiding: From Secrets to Fingerprint Images (nonfiction)]] | |||
* [[Johannes Trithemius (nonfiction)]] | |||
External links: | External links: | ||
Line 28: | Line 39: | ||
* [https://blog.benjojo.co.uk/post/encoding-data-into-dubstep-drops Encoding data in dubstep drops] | * [https://blog.benjojo.co.uk/post/encoding-data-into-dubstep-drops Encoding data in dubstep drops] | ||
* [https://boingboing.net/2018/11/05/data-fingerprinting.html Steganographically hiding secret messages in fake fingerprints] @ Boing Boing | * [https://boingboing.net/2018/11/05/data-fingerprinting.html Steganographically hiding secret messages in fake fingerprints] @ Boing Boing | ||
* [https://spectrum.ieee.org/tech-talk/telecom/security/how-to-encode-a-secret-message-into-a-fingerprint How to Encode a Secret Message in a Fingerprint] @ IEEE | |||
[[Category:Nonfiction (nonfiction)]] | [[Category:Nonfiction (nonfiction)]] | ||
[[Category:Cryptography (nonfiction)]] | [[Category:Cryptography (nonfiction)]] |
Latest revision as of 17:01, 7 November 2018
Steganography is the practice of concealing a file, message, image, or video within another file, message, image, or video.
The word steganography combines the Greek words steganos (στεγανός), meaning "covered, concealed, or protected", and graphein (γράφειν) meaning "writing".
The first recorded use of the term was in 1499 by Johannes Trithemius in his Steganography (STEG-ə-NOG-rə-fee) is the practice of concealing a file, message, image, or video within another file, message, image, or video. The word steganography combines the Greek words steganos (στεγανός), meaning "covered, concealed, or protected," and graphein (γράφειν) meaning "writing".
The first recorded use of the term was in 1499 by Johannes Trithemius in his Steganographia, a treatise on cryptography and steganography, disguised as a book on magic. Generally, the hidden messages appear to be (or be part of) something else: images, articles, shopping lists, or some other cover text. For example, the hidden message may be in invisible ink between the visible lines of a private letter. Some implementations of steganography that lack a shared secret are forms of security through obscurity, and key-dependent steganographic schemes adhere to Kerckhoffs's principle.
The advantage of steganography over cryptography alone is that the intended secret message does not attract attention to itself as an object of scrutiny. Plainly visible encrypted messages, no matter how unbreakable they are, arouse interest and may in themselves be incriminating in countries in which encryption is illegal.
Whereas cryptography is the practice of protecting the contents of a message alone, steganography is concerned with concealing the fact that a secret message is being sent as well as concealing the contents of the message.
Steganography includes the concealment of information within computer files. In digital steganography, electronic communications may include steganographic coding inside of a transport layer, such as a document file, image file, program or protocol. Media files are ideal for steganographic transmission because of their large size. For example, a sender might start with an innocuous image file and adjust the color of every hundredth pixel to correspond to a letter in the alphabet. The change is so subtle that someone who is not specifically looking for it is unlikely to notice the change.
In the News
1484: Polymath Johannes Trithemius publishes Chronicles of an Gnomon Algorithm Cryptographer, for which he will be posthumously awarded the Pulitzer Prize.
Fiction cross-reference
- Cryptographic numen - a numen (nonfiction) arising from cryptography.
- Casio + N = CasiNo
- Ivan Steganog
Nonfiction cross-reference
- Cryptography (nonfiction)
- Towards Construction Based Data Hiding: From Secrets to Fingerprint Images (nonfiction)
- Mathematics (nonfiction)
- Oblivious transfer (nonfiction) - an oblivious transfer (OT) protocol is a protocol in which a sender transfers one of potentially many pieces of information to a receiver, but remains oblivious as to what piece (if any) has been transferred.
- Towards Construction Based Data Hiding: From Secrets to Fingerprint Images (nonfiction)
- Johannes Trithemius (nonfiction)
External links: