2 cissp ® Official Study Guide Eighth Edition


Steganography and Watermarking



Download 19,3 Mb.
Pdf ko'rish
bet246/881
Sana08.04.2023
Hajmi19,3 Mb.
#925879
1   ...   242   243   244   245   246   247   248   249   ...   881
Bog'liq
(CISSP) Mike Chapple, James Michael Stewart, Darril Gibson - CISSP Official Study Guide-Sybex (2018)

 Steganography and Watermarking 
Steganography
is the art of using cryptographic techniques to embed secret messages 
within another message. Steganographic algorithms work by making alterations to the least 


258
Chapter 7 

PKI and Cryptographic Applications
significant bits of the many bits that make up image files. The changes are so minor that 
there is no appreciable effect on the viewed image. This technique allows communicating 
parties to hide messages in plain sight—for example, they might embed a secret message 
within an illustration on an otherwise innocent web page.
Steganographers often embed their secret messages within images or WAV files because 
these files are often so large that the secret message would easily be missed by even the 
most observant inspector. Steganography techniques are often used for illegal or question-
able activities, such as espionage and child pornography.
Steganography can also be used for legitimate purposes, however. Adding digital water-
marks to documents to protect intellectual property is accomplished by means of steganog-
raphy. The hidden information is known only to the file’s creator. If someone later creates 
an unauthorized copy of the content, the watermark can be used to detect the copy and (if 
uniquely watermarked files are provided to each original recipient) trace the offending copy 
back to the source.
Steganography is an extremely simple technology to use, with free tools openly avail-
able on the internet. Figure 7.2 shows the entire interface of one such tool, iSteg. It simply 
requires that you specify a text file containing your secret message and an image file that 
you wish to use to hide the message. Figure 7.3 shows an example of a picture with an 
embedded secret message; the message is impossible to detect with the human eye.
F I g u r e 7. 2
Steganography tool


Applied Cryptography 

Download 19,3 Mb.

Do'stlaringiz bilan baham:
1   ...   242   243   244   245   246   247   248   249   ...   881




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish