Sie sind auf Seite 1von 4

STEGANOGRAPHY This project provides an overview of steganalysis and introduced some characteristics of steganographic software that point signs

of information hiding. This work is but a fraction of thesteganalysis approach. To date general detection techniques as applied to steganography have notb e e n d e v i s e d a n d m e t h o d s b e y o n d visual analysis are being explored. Methods of messagedetection and understanding th e thresholds of current technology are u n d e r i n v e s t i g a t i o n . Success in steganographic secrecy results from selecting t h e p r o p e r m e c h a n i s m s . H o w e v e r , a stegomedium which seems innocent enough may, upon further investigation, actually broadcastthe existence of embedded information.D e v e l o p m e n t i n t h e a r e a of covert communications and steganogr a p h y w i l l c o n t i n u e . Research in building more robust methods that can survive image m a n i p u l a t i o n a n d a t t a c k s continues to grow. The more information is placed in the public's reach on the Internet, the moreo w n e r s o f s u c h i n f o r m a t i o n need to protect themselves from theft a n d f a l s e r e p r e s e n t a t i o n . Systems to recover seemingly destroyed information and steganalysis techniques will be usefulto law enforcement authorities in computer forensics and digital traffic

analysis.M o s t d a t a - h i d i n g s y s t e m s t a k e advantage of human perceptual weaknes s e s , b u t h a v e weaknesses of their own. For now, it seems that no system of data-hiding is t o t a l l y i m m u n e t o attack.However, steganography has its place in security. It in no way can replace cryptography, buti s i n t e n d e d t o s u p p l e m e n t i t . I t s application in watermarking and f i n g e r p r i n t i n g , f o r u s e i n detection of unauthorized, illegally copied material, is continually being realized and developed.Also, in places where standard cryptography and encryption is outlawed, steganography can beused for covert data transmission. Steganography, formerly just an interest of the military, is nowg a i n i n g popularity among the masses. Soon, any computer user will be able to put his o w n watermark on his artistic creations. 10. FUTURE ENHANCEMENTS 24

STEGANOGRAPHY Methods of message detection and understanding the thresholds of current technologya r e u n d e r investigation. Success in Steganography secrecy results from selecting the proper m e c h a n i s m s . H o w e v e r , a s t e g o m e dium which seems innocent enough may,

u p o n f u r t h e r investigation, actually broadcast the existence of embedded information.Development in the area of covert communications and Steganography will continue.R e s e a r c h i n b u i l d i n g m o r e r o b u s t methods that can survive image manipulation a n d a t t a c k s continues to grow. The more information is placed in the public's reach on the Internet, the moreo w n e r s o f s u c h i n f o r m a t i o n n e e d t o protect themselves from theft and false r e p r e s e n t a t i o n . Systems to recover seemingly destroyed information and steganalysis techniques will be usefulto law enforcement authorities in computer forensics and digital traffic analysis.M o s t o f t h e n e w e r applications use Steganography like a w a t e r m a r k , t o p r o t e c t copyright on information. 25

STEGANOGRAPHY 11. Bibliography11.1 Books Cryptography and Networks Security , William Stallings, 3 rd Edition, PearsonEducation, 2003 The Complete Reference C++

by Herbert Schildt, TMH , 3 rd Edition Visual Basic 6.0 Programming, Eric A.Smith, Valor Whisler and Hank Marquis 11.2 Websites http://www.cs.uct.ac.za/courses/CS400W/NIS/papers99/ http://members.tripod.com/steganography/stego.html http://www.cl.cam.ac.uk/~fapp2/steganography/ http://www.iks-jena.de/mitarb/lutz/security/stegano.html http://www.all-nettools.com/privacy/stegano.htm http://www.aces.att.com/glossary/steganog.htm http://www.cdt.luth.se/~peppar/kurs/smd074/lekt/7/slide0.h tml http://www.ise.gmu.edu/~njohnson/ihws98/jjgmu.html http://www.jjtc.com/Steganography/ 26

Das könnte Ihnen auch gefallen