Difference between revisions of "Steganography"

From Forensics Wiki
Jump to: navigation, search
Line 1: Line 1:
'''Steganography''' is a science that pertains to the art of concealing data in a communication in such a way that only the sender and receiver know of its existance and method of access. The platform used for transmission can be anything from a paper document to a digital file. Additionally, it is more common than not to [[encrypt]] the hidden data whenever possible such as with digital files or images.
+
'''Steganography''' is a science that pertains to the art of concealing data in a communication in such a way that only the sender and receiver know of its existance and method of access. The platform used for transmission can be anything from a paper document to a digital file. Additionally, it is more common than not to [[encrypt]] the hidden data whenever possible such as with digital files or images. The detection of steganographically encoded packages is called '''steganalysis'''.
  
 
==External links==
 
==External links==

Revision as of 21:43, 20 July 2008

Steganography is a science that pertains to the art of concealing data in a communication in such a way that only the sender and receiver know of its existance and method of access. The platform used for transmission can be anything from a paper document to a digital file. Additionally, it is more common than not to encrypt the hidden data whenever possible such as with digital files or images. The detection of steganographically encoded packages is called steganalysis.

External links

Steganalysis

  • Steganography Analysis and Research Center The Steganography Analysis and Research Center is a Center of Excellence within Backbone Security focused exclusively on steganography research and development of steganalysis products and services.

Algorithms and Tools

  • StegoArchive.com An excellent resource for freeware/shareware steganography application downloads.
  • M5, by Andreas Westfeld, is both a steganographic tool and algorithm. It hides information in JPEGs. An attack was developed by Jessica Fridrich, Miroslav Goljan, and Dorin Hogea. Information can be found at http://wwwrn.inf.tu-dresden.de/~westfeld/f5.html .