ipl-logo

The History Of Steganography

1583 Words7 Pages

CHAPTER 1
INTRODUCTION

STEGANOGRAPHY
Steganography is the art or practice of hiding a message, picture, or document inside another message, picture, or file. The term steganography is derived from the Greek words- stegano means "covered or else protected", in addition graphed signifies "writing" and combining these two Greek words defining it as “covered writing” [1]. Steganography is used to conceal the messages inside other harmless messages in a way that does not allow any enemy to even sense that there is a second secret message present in it. In the present electronic correspondence situation, information security is one of the significant difficulties. The need for a secure and robust communication between the communicating entities …show more content…

The primary record of steganography showed up in the works of the Greek historian, Herodotus. The earliest documented utilizatons of steganography could easily be traced back the information to 440 B.C, Demaratus directed a notification around an unavoidable attack to Greece through writing the situation directly on the timber backing of a wax slab beforehand applying its beeswax surface [4]. Beeswax tablets were in identical manner which was utilized in earlier times as recyclable comprising surfaces, within a few amount of time it was made use for shorthand. In ancient Greece, people write messages on the wood, and then enclosed the message securely within the wood as a result of which an acquitted covering message was engraved. Greeks also documented a fascinating story about transporting strategic data above huge distance deprived of being noticeable. A ruler named Histiaeus utilized “stego” carrier by tattooing a message on the shaved head of the man. When his hair grew back, the prisoner was sent off to his target effectively, deprived of the message being distinguished. Over the course of the hundreds of years, numerous different strategies have been utilized as a part of fighting, in secret activities and to cover up illegal undertakings. In old China, messages were composed on silk, plunged in wax, and gulped [5]. Numerous societies have practiced steganography by writing messages using undetectable …show more content…

The conceivable spread transporters are blameless looking carriers (images, audio, video, text, or some other digitally representative code) which will hold the concealed data. A message is the data concealed and it may be plain text, cipher text, images, or anything that can be embedded into a bit torrent. It is composed of the cover carrier as well as the implanted message and it creates a stego-carrier. The concealing of data may oblige a stego key which is additional mystery data, for example, a secret word needed for implanting the information. When a secret message is hidden within a cover video, the subsequent item is a stego-video [6]. A conceivable equation of the procedure may be represented

Open Document