Steganography
   HOME
*



picture info

Steganography
Steganography ( ) is the practice of representing information within another message or physical object, in such a manner that the presence of the information is not evident to human inspection. In computing/electronic contexts, a computer file, message, image, or video is concealed within another file, message, image, or video. The word ''steganography'' comes from Greek ''steganographia'', which combines the words ''steganós'' (), meaning "covered or concealed", and ''-graphia'' () meaning "writing". The first recorded use of the term was in 1499 by Johannes Trithemius in his '' Steganographia'', a treatise on cryptography and steganography, disguised as a book on magic. Generally, the hidden messages appear to be (or to be part of) something else: images, articles, shopping lists, or some other cover text. For example, the hidden message may be in invisible ink between the visible lines of a private letter. Some implementations of steganography that lack a shared secret are f ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Steganography
Steganography ( ) is the practice of representing information within another message or physical object, in such a manner that the presence of the information is not evident to human inspection. In computing/electronic contexts, a computer file, message, image, or video is concealed within another file, message, image, or video. The word ''steganography'' comes from Greek ''steganographia'', which combines the words ''steganós'' (), meaning "covered or concealed", and ''-graphia'' () meaning "writing". The first recorded use of the term was in 1499 by Johannes Trithemius in his '' Steganographia'', a treatise on cryptography and steganography, disguised as a book on magic. Generally, the hidden messages appear to be (or to be part of) something else: images, articles, shopping lists, or some other cover text. For example, the hidden message may be in invisible ink between the visible lines of a private letter. Some implementations of steganography that lack a shared secret are f ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Steganography In The Hand Of John Dee
Steganography ( ) is the practice of representing information within another message or physical object, in such a manner that the presence of the information is not evident to human inspection. In computing/electronic contexts, a computer file, message, image, or video is concealed within another file, message, image, or video. The word ''steganography'' comes from Greek ''steganographia'', which combines the words ''steganós'' (), meaning "covered or concealed", and ''-graphia'' () meaning "writing". The first recorded use of the term was in 1499 by Johannes Trithemius in his '' Steganographia'', a treatise on cryptography and steganography, disguised as a book on magic. Generally, the hidden messages appear to be (or to be part of) something else: images, articles, shopping lists, or some other cover text. For example, the hidden message may be in invisible ink between the visible lines of a private letter. Some implementations of steganography that lack a shared secret are f ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Microdot Camera Markiv
A microdot is text or an image substantially reduced in size to prevent detection by unintended recipients. Microdots are normally circular and around in diameter but can be made into different shapes and sizes and made from various materials such as polyester or metal. The name comes from the fact that the microdots have often been about the size and shape of a typographical dot, such as a period or the tittle of a lowercase ''i'' or ''j''. Microdots are, fundamentally, a steganographic approach to message protection. History In 1870 during the Franco-Prussian War, Paris was under siege and messages were sent by carrier pigeon. Parisian photographer René Dagron used microfilm to permit each pigeon to carry a high volume of messages, as pigeons can carry little weight. Improvement in technology since then has made even more miniaturization possible. At the International Congress of Photography in Paris in 1925 Emanuel Goldberg presented a method of producing extreme reducti ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  




Null Cipher
A null cipher, also known as concealment cipher, is an ancient form of encryption where the plaintext is mixed with a large amount of non-cipher material. Today it is regarded as a simple form of steganography, which can be used to hide ciphertext. This is one of 3 categories of cipher used in classical cryptography along with Substitution ciphers and Transposition ciphers. Classical cryptography In classical cryptography, a ''null'' is intended to confuse the cryptanalyst. In the most common form of a null cipher, the plaintext is included within the ciphertext and one needs to discard certain characters in order to decrypt the message (such as first letter, last letter, third letter of every second word, etc.) Most characters in such a cryptogram are nulls, only some are significant, and some others can be used as pointers to the significant ones. Here is an example null cipher message, sent by a German during World War I: Taking the first letter of every word reveals the ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Microdot
A microdot is text or an image substantially reduced in size to prevent detection by unintended recipients. Microdots are normally circular and around in diameter but can be made into different shapes and sizes and made from various materials such as polyester or metal. The name comes from the fact that the microdots have often been about the size and shape of a typographical dot, such as a period or the tittle of a lowercase ''i'' or ''j''. Microdots are, fundamentally, a steganographic approach to message protection. History In 1870 during the Franco-Prussian War, Paris was under siege and messages were sent by carrier pigeon. Parisian photographer René Dagron used microfilm to permit each pigeon to carry a high volume of messages, as pigeons can carry little weight. Improvement in technology since then has made even more miniaturization possible. At the International Congress of Photography in Paris in 1925 Emanuel Goldberg presented a method of producing extreme reducti ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Johannes Trithemius
Johannes Trithemius (; 1 February 1462 – 13 December 1516), born Johann Heidenberg, was a German Benedictine abbot and a polymath who was active in the German Renaissance as a lexicographer, chronicler, cryptographer, and occultist. He is considered the founder of modern cryptography (a claim shared with Leon Battista Alberti) and steganography, as well as the founder of bibliography and literary studies as branches of knowledge. He had considerable influence on the development of early modern and modern occultism. His students included Heinrich Cornelius Agrippa and Paracelsus. Early life The byname ''Trithemius'' refers to his native town of Trittenheim on the Moselle River, at the time part of the Electorate of Trier. When Johannes was still an infant his father, Johann von Heidenburg, died. His stepfather, whom his mother Elisabeth married seven years later, was hostile to education and thus Johannes could only learn in secret and with many difficulties. He learned Greek, ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Steganographia
''Steganographia'' is a book on steganography, written in c. 1499 by the German Benedictine abbot and polymath Johannes Trithemius. General Trithemius' most famous work, ''Steganographia'' (written c. 1499; published Frankfurt, 1606), was placed on the ''Index Librorum Prohibitorum'' in 1609 and removed in 1900. This book is in three volumes, and appears to be about magic—specifically, about using spirits to communicate over long distances. However, since the publication of a decryption key to the first two volumes in 1606, they have been known to be actually concerned with cryptography and steganography. Until recently, the third volume was widely still believed to be solely about magic, but the "magical" formulae have now been shown to be covertexts for yet more material on cryptography. Reception Mentions within the third book of the magical work by such figures as Agrippa and John Dee still lend credence to the idea of a mystic-magical foundation concerning the third ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Cryptography
Cryptography, or cryptology (from grc, , translit=kryptós "hidden, secret"; and ''graphein'', "to write", or ''-logia'', "study", respectively), is the practice and study of techniques for secure communication in the presence of adversarial behavior. More generally, cryptography is about constructing and analyzing protocols that prevent third parties or the public from reading private messages. Modern cryptography exists at the intersection of the disciplines of mathematics, computer science, information security, electrical engineering, digital signal processing, physics, and others. Core concepts related to information security ( data confidentiality, data integrity, authentication, and non-repudiation) are also central to cryptography. Practical applications of cryptography include electronic commerce, chip-based payment cards, digital currencies, computer passwords, and military communications. Cryptography prior to the modern age was effectively synonymo ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Espionage
Espionage, spying, or intelligence gathering is the act of obtaining secret or confidential information (intelligence) from non-disclosed sources or divulging of the same without the permission of the holder of the information for a tangible benefit. A person who commits espionage is called an ''espionage agent'' or ''spy''. Any individual or spy ring (a cooperating group of spies), in the service of a government, company, criminal organization, or independent operation, can commit espionage. The practice is clandestine, as it is by definition unwelcome. In some circumstances, it may be a legal tool of law enforcement and in others, it may be illegal and punishable by law. Espionage is often part of an institutional effort by a government or commercial concern. However, the term tends to be associated with state spying on potential or actual enemies for military purposes. Spying involving corporations is known as industrial espionage. One of the most effective ways to gath ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Security Through Obscurity
Security through obscurity (or security by obscurity) is the reliance in security engineering on design or implementation secrecy as the main method of providing security to a system or component. History An early opponent of security through obscurity was the locksmith Alfred Charles Hobbs, who in 1851 demonstrated to the public how state-of-the-art locks could be picked. In response to concerns that exposing security flaws in the design of locks could make them more vulnerable to criminals, he said: "Rogues are very keen in their profession, and know already much more than we can teach them." There is scant formal literature on the issue of security through obscurity. Books on security engineering cite Kerckhoffs' doctrine from 1883, if they cite anything at all. For example, in a discussion about secrecy and openness in Nuclear Command and Control: e benefits of reducing the likelihood of an accidental war were considered to outweigh the possible benefits of secrecy. This ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

The Histories Of Herodotus
The ''Histories'' ( el, Ἱστορίαι, ; also known as ''The History'') of Herodotus is considered the founding work of history in Western literature. Written around 430 BC in the Ionic dialect of classical Greek, ''The Histories'' serves as a record of the ancient traditions, politics, geography, and clashes of various cultures that were known in Greece, Western Asia and Northern Africa at that time. Although not a fully impartial record, it remains one of the West's most important sources regarding these affairs. Moreover, it established the genre and study of history in the Western world (despite the existence of historical records and chronicles beforehand). ''The'' ''Histories'' also stands as one of the earliest accounts of the rise of the Achaemenid Empire, Persian Empire, as well as the events and causes of the Greco-Persian Wars between the Persian Empire and the Polis, Greek city-states in the 5th century BC. Herodotus portrays the conflict as one between the fo ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Invisible Ink
Invisible ink, also known as security ink or sympathetic ink, is a substance used for writing, which is invisible either on application or soon thereafter, and can later be made visible by some means, such as heat or ultraviolet light. Invisible ink is one form of steganography. History One of the earliest writers to mention an invisible ink is Aeneas Tacticus, in the 4th century BC. He mentions it in discussing how to survive under siege but does not indicate the type of ink to be used. This was part of his list of the 20 different methods of secret communications in a book called ''On the Defense of Fortifications''. One of the techniques that involved steganography involved puncturing a tiny hole above or below letters in a document to spell out a secret message. This did not include an invisible ink but the Germans improved on the method during World War I and World War II. They used invisible ink and microdots instead of pinpricks. Philo of Byzantium may be the first writer ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]