SlideShare une entreprise Scribd logo
1  sur  12
Steganography
Shawaiz Ahmed (18I-0826)
Introduction
• Greek Words:
STEGANOS – “Covered”
GRAPHIE– “Writing”
• Advance security is not maintained by the password protection but it is gained by
hiding the existence of the data, which can only be done by Steganography.
• Steganography is the art and science of writing hidden messages in such a way that no one
apart from the intended recipient knows of the existenceof the message.
• This can be achieve by concealing the existence of informationwithin seemingly
harmless carriers or cover
• Carrier: text, image, video, audio, etc.
History
• Greeks used it writing message on some material and later covering it with wax, tattooing
messages on bald head, later growing hair to cover it up.
• In World War II invisible inks were used to write messages in between the lines of
normal text message .
• Currently, cryptography and steganography are used to hide and send the secret data.
Steganography
v/s
Cryptography
• Cryptography hides the contents of a
secret message from a malicious
people, whereas Steganography
even conceals the existence of the
message
• In cryptography, the structure of a message
is scrambled to make it meaningless and
unintelligible unless the decryption key is
available
• Steganography does not alter the
structure of the secret message, but
hides it inside a cover-image so it
cannot be seen.
Types of Steganography
• Steganography In Text/Documents
• Steganography In Images
• Steganography InAudio
• Steganography In Video
Steganography Techniques
• Injection
• Substitution
• Generation
Steganalysis
• The art of detecting Steganography is
referred to as Steganalysis.
• Using different tools like
sendsecret, Steganography 8.1 ,
Stegdetect, Hiderman etc.
• Steganalysis does not deal with trying to
decrypt the hidden information inside of a
file, just discovering it.
• It is mainly done with comparing the
encrypted file with the original copy.
Pros
• It is used in the way of hiding not the
Information but the password to
reach that Information.
• Messages do not attract attention to
themselves i.e difficult to detect.
Only receiver can detect.
• The proposed technique uses LSB to
hide data from a pre defined
position agreed between two
parties. Same position is only used
once to enhance security.
• Can be applied differently in digital
image, audio & video file.
Cons
• Huge number of data results in
huge file size, so some one can
suspect about it.
• In sending and receiving information
can be leaked.
• It is Vulnerable to almost all media
transformations.
• If this technique is used in a wrong way
then this can be very much dangerous.
Applications
• Confidential communication and secret data storing
• Protection of data alteration
• Used in modern printers
• Protect copyrights, to maintain confidentiality.
Conclusion
• Steganography is in the nascent stage of development.
• The importance of Steganography has not been realized to that stage where it is
preferred over its close rival “Encryption”.
• New techniques are being discovered and implemented. It is analyzed that time is
not far away when its importance would be realized by organizations in general
and the arm forces in particular.
References
 http://en.wikipedia.org/wiki/Steganography8
 http://computer.howstuffworks.com/file-compression3.htm
 http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=4547669
 http://www.math.ucsd.edu/~crypto/Projects/MaxWeiss/steganography.pdf
 http://www.sans.org/reading_room/whitepapers/covert/steganography-matters-
post-911-world_676
 http://www.scribd.com/doc/49683406/1/Steganography-vs-Cryptography
Steganography

Contenu connexe

Tendances

Informe CLIL i video Comunicació.
Informe CLIL i video Comunicació.Informe CLIL i video Comunicació.
Informe CLIL i video Comunicació.lluís nater
 
online game over cryptography
online game over cryptographyonline game over cryptography
online game over cryptographyAshish Kumar
 
A+ Update Endpoint Encryption
A+ Update Endpoint EncryptionA+ Update Endpoint Encryption
A+ Update Endpoint EncryptionOSU - East
 
Week13
Week13Week13
Week13GroupB
 
GhostID - A document watermarking technology
GhostID - A document watermarking technology GhostID - A document watermarking technology
GhostID - A document watermarking technology Gilles Dubroeucq
 
Chapter 1: Overview of Network Security
Chapter 1: Overview of Network SecurityChapter 1: Overview of Network Security
Chapter 1: Overview of Network SecurityShafaan Khaliq Bhatti
 
Chapter 13 steganography and watermarking
Chapter 13   steganography and watermarkingChapter 13   steganography and watermarking
Chapter 13 steganography and watermarkingamitchauhan1990
 
How encryption works
How encryption worksHow encryption works
How encryption worksMariko Saitoh
 
Csi Netsec 2006 Poor Mans Guide Merdinger
Csi Netsec 2006 Poor Mans Guide MerdingerCsi Netsec 2006 Poor Mans Guide Merdinger
Csi Netsec 2006 Poor Mans Guide Merdingershawn_merdinger
 
Firewall
FirewallFirewall
FirewallGarmian
 
Securing blockchain assets
Securing blockchain assetsSecuring blockchain assets
Securing blockchain assetsSimon Wilson
 
fundamental of network security
fundamental of network securityfundamental of network security
fundamental of network securityManish Tiwari
 

Tendances (19)

Informe CLIL i video Comunicació.
Informe CLIL i video Comunicació.Informe CLIL i video Comunicació.
Informe CLIL i video Comunicació.
 
Cryptppt1
Cryptppt1Cryptppt1
Cryptppt1
 
online game over cryptography
online game over cryptographyonline game over cryptography
online game over cryptography
 
A+ Update Endpoint Encryption
A+ Update Endpoint EncryptionA+ Update Endpoint Encryption
A+ Update Endpoint Encryption
 
Week13
Week13Week13
Week13
 
Physical Security and Digital Security
Physical Security and Digital SecurityPhysical Security and Digital Security
Physical Security and Digital Security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
GhostID - A document watermarking technology
GhostID - A document watermarking technology GhostID - A document watermarking technology
GhostID - A document watermarking technology
 
Chapter 1: Overview of Network Security
Chapter 1: Overview of Network SecurityChapter 1: Overview of Network Security
Chapter 1: Overview of Network Security
 
Sw2 b12
Sw2 b12Sw2 b12
Sw2 b12
 
Steganography
SteganographySteganography
Steganography
 
Chapter 13 steganography and watermarking
Chapter 13   steganography and watermarkingChapter 13   steganography and watermarking
Chapter 13 steganography and watermarking
 
How encryption works
How encryption worksHow encryption works
How encryption works
 
Csi Netsec 2006 Poor Mans Guide Merdinger
Csi Netsec 2006 Poor Mans Guide MerdingerCsi Netsec 2006 Poor Mans Guide Merdinger
Csi Netsec 2006 Poor Mans Guide Merdinger
 
Firewall
FirewallFirewall
Firewall
 
Securing blockchain assets
Securing blockchain assetsSecuring blockchain assets
Securing blockchain assets
 
fundamental of network security
fundamental of network securityfundamental of network security
fundamental of network security
 
OTT DRM
OTT DRMOTT DRM
OTT DRM
 
Encryption
EncryptionEncryption
Encryption
 

Similaire à Steganography

Steganography
SteganographySteganography
SteganographySonam M
 
SEMINAR ON staganography
SEMINAR ON staganographySEMINAR ON staganography
SEMINAR ON staganographyKamonasish Hore
 
Steganography_ENS
Steganography_ENSSteganography_ENS
Steganography_ENSjusttest10
 
206470316015_ENS.pptx
206470316015_ENS.pptx206470316015_ENS.pptx
206470316015_ENS.pptxjusttest10
 
Data hiding - Steganography
Data hiding - SteganographyData hiding - Steganography
Data hiding - SteganographyMohamed Talaat
 
Steganography ProjectReport
Steganography ProjectReportSteganography ProjectReport
Steganography ProjectReportekta sharma
 
Steganography Engineering project report
Steganography Engineering project reportSteganography Engineering project report
Steganography Engineering project reportRishab Gupta
 
Visual Cryptography part 1-1.pptx.pptx
Visual Cryptography part 1-1.pptx.pptxVisual Cryptography part 1-1.pptx.pptx
Visual Cryptography part 1-1.pptx.pptxThusharaBAmigoz1
 
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...IOSR Journals
 
Steganography
SteganographySteganography
Steganographysandeipz
 
Steganography ppt.ppt
Steganography ppt.pptSteganography ppt.ppt
Steganography ppt.pptNavyaChikki1
 
Presentation On Steganography
Presentation On SteganographyPresentation On Steganography
Presentation On SteganographyTeachMission
 
A Robust Technique to Encrypt and Decrypt Confidential Data within Image
A Robust Technique to Encrypt and Decrypt Confidential Data within ImageA Robust Technique to Encrypt and Decrypt Confidential Data within Image
A Robust Technique to Encrypt and Decrypt Confidential Data within Imageinventionjournals
 

Similaire à Steganography (20)

Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
SEMINAR ON staganography
SEMINAR ON staganographySEMINAR ON staganography
SEMINAR ON staganography
 
steganography
steganographysteganography
steganography
 
Steganography_ENS
Steganography_ENSSteganography_ENS
Steganography_ENS
 
206470316015_ENS.pptx
206470316015_ENS.pptx206470316015_ENS.pptx
206470316015_ENS.pptx
 
Data hiding - Steganography
Data hiding - SteganographyData hiding - Steganography
Data hiding - Steganography
 
Steganography ProjectReport
Steganography ProjectReportSteganography ProjectReport
Steganography ProjectReport
 
Steganography Engineering project report
Steganography Engineering project reportSteganography Engineering project report
Steganography Engineering project report
 
Visual Cryptography part 1-1.pptx.pptx
Visual Cryptography part 1-1.pptx.pptxVisual Cryptography part 1-1.pptx.pptx
Visual Cryptography part 1-1.pptx.pptx
 
Final2
Final2Final2
Final2
 
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...
 
Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
Review of Role of Digital Video in Information Security
Review of Role of Digital Video in Information SecurityReview of Role of Digital Video in Information Security
Review of Role of Digital Video in Information Security
 
steganography
steganographysteganography
steganography
 
Steganography ppt.ppt
Steganography ppt.pptSteganography ppt.ppt
Steganography ppt.ppt
 
Presentation On Steganography
Presentation On SteganographyPresentation On Steganography
Presentation On Steganography
 
A Robust Technique to Encrypt and Decrypt Confidential Data within Image
A Robust Technique to Encrypt and Decrypt Confidential Data within ImageA Robust Technique to Encrypt and Decrypt Confidential Data within Image
A Robust Technique to Encrypt and Decrypt Confidential Data within Image
 
A NOVEL APPROACHES TOWARDS STEGANOGRAPHY
A NOVEL APPROACHES TOWARDS STEGANOGRAPHYA NOVEL APPROACHES TOWARDS STEGANOGRAPHY
A NOVEL APPROACHES TOWARDS STEGANOGRAPHY
 

Dernier

Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...apidays
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbuapidays
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 

Dernier (20)

Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 

Steganography

  • 2. Introduction • Greek Words: STEGANOS – “Covered” GRAPHIE– “Writing” • Advance security is not maintained by the password protection but it is gained by hiding the existence of the data, which can only be done by Steganography. • Steganography is the art and science of writing hidden messages in such a way that no one apart from the intended recipient knows of the existenceof the message. • This can be achieve by concealing the existence of informationwithin seemingly harmless carriers or cover • Carrier: text, image, video, audio, etc.
  • 3. History • Greeks used it writing message on some material and later covering it with wax, tattooing messages on bald head, later growing hair to cover it up. • In World War II invisible inks were used to write messages in between the lines of normal text message . • Currently, cryptography and steganography are used to hide and send the secret data.
  • 4. Steganography v/s Cryptography • Cryptography hides the contents of a secret message from a malicious people, whereas Steganography even conceals the existence of the message • In cryptography, the structure of a message is scrambled to make it meaningless and unintelligible unless the decryption key is available • Steganography does not alter the structure of the secret message, but hides it inside a cover-image so it cannot be seen.
  • 5. Types of Steganography • Steganography In Text/Documents • Steganography In Images • Steganography InAudio • Steganography In Video
  • 6. Steganography Techniques • Injection • Substitution • Generation
  • 7. Steganalysis • The art of detecting Steganography is referred to as Steganalysis. • Using different tools like sendsecret, Steganography 8.1 , Stegdetect, Hiderman etc. • Steganalysis does not deal with trying to decrypt the hidden information inside of a file, just discovering it. • It is mainly done with comparing the encrypted file with the original copy.
  • 8. Pros • It is used in the way of hiding not the Information but the password to reach that Information. • Messages do not attract attention to themselves i.e difficult to detect. Only receiver can detect. • The proposed technique uses LSB to hide data from a pre defined position agreed between two parties. Same position is only used once to enhance security. • Can be applied differently in digital image, audio & video file. Cons • Huge number of data results in huge file size, so some one can suspect about it. • In sending and receiving information can be leaked. • It is Vulnerable to almost all media transformations. • If this technique is used in a wrong way then this can be very much dangerous.
  • 9. Applications • Confidential communication and secret data storing • Protection of data alteration • Used in modern printers • Protect copyrights, to maintain confidentiality.
  • 10. Conclusion • Steganography is in the nascent stage of development. • The importance of Steganography has not been realized to that stage where it is preferred over its close rival “Encryption”. • New techniques are being discovered and implemented. It is analyzed that time is not far away when its importance would be realized by organizations in general and the arm forces in particular.
  • 11. References  http://en.wikipedia.org/wiki/Steganography8  http://computer.howstuffworks.com/file-compression3.htm  http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=4547669  http://www.math.ucsd.edu/~crypto/Projects/MaxWeiss/steganography.pdf  http://www.sans.org/reading_room/whitepapers/covert/steganography-matters- post-911-world_676  http://www.scribd.com/doc/49683406/1/Steganography-vs-Cryptography

Notes de l'éditeur

  1. Steganography is the technique of hiding secret data within an ordinary, non-secret, file or message in order to avoid detection