• [email protected]
  • +971 507 888 742
Submit Manuscript
SciAlert
  • Home
  • Journals
  • Information
    • For Authors
    • For Referees
    • For Librarian
    • For Societies
  • Contact
  1. Information Technology Journal
  2. Vol 3 (3), 2004
  3. 245-269
  • Online First
  • Current Issue
  • Previous Issues
  • More Information
    Aims and Scope Editorial Board Guide to Authors Article Processing Charges
    Submit a Manuscript

Information Technology Journal

Year: 2004 | Volume: 3 | Issue: 3 | Page No.: 245-269
DOI: 10.3923/itj.2004.245.269

Facebook Twitter Digg Reddit Linkedin StumbleUpon E-mail

Article Trend



Total views 2192

Search


Authors


Kefa Rabah


Keywords


  • cryptography
  • Steganography
  • hiding information
Research Article

Steganography-The Art of Hiding Data

Kefa Rabah
Given the shear volume of data stored and transmitted electronically in the world today, it is no surprise that countless methods of protecting such data have evolved. One lesser-known but rapidly growing method is steganography, the art and science of hiding information so that it does not even appear to exist. Moreover, in an ideal world we would all be able to openly send encrypted email or files to each other with no fear of reprisals. However, there are often cases when this is not possible, either because you are working for a company that does not allow encrypted emails or perhaps the local government does not approve of encrypted communication. This is one of the cases where Steganography can help hide the encrypted messages, images, keys, secret data, etc. This paper discusses the purpose of steganography. Explains how steganography is related to cryptography as well as what it can and cannot be used for. It also discusses a brief history of steganography. In addition, some of the tools and software used in steganography are demonstrated and including some discussion of the most popular algorithms involved in these tools. This paper further explains the advantages and disadvantages, as well as, strengths and weaknesses in the use of steganography.
PDF Fulltext XML References Citation

How to cite this article

Kefa Rabah, 2004. Steganography-The Art of Hiding Data. Information Technology Journal, 3: 245-269.

DOI: 10.3923/itj.2004.245.269

URL: https://scialert.net/abstract/?doi=itj.2004.245.269

Related Articles

Modeling Combo PR Generator for Stego Storage Self Test (SSST)
Short Message (Service) as Key for Steganography
Steganography-Time to Time: A Review
A Novel Reversible Text Data Hiding Scheme
Inverted Pattern in Inverted Time Domain for Icon Steganography

Leave a Comment


Your email address will not be published. Required fields are marked *

Useful Links

  • Journals
  • For Authors
  • For Referees
  • For Librarian
  • For Socities

Contact Us

Office Number 1128,
Tamani Arts Building,
Business Bay,
Deira, Dubai, UAE

Phone: +971 507 888 742
Email: [email protected]

About Science Alert

Science Alert is a technology platform and service provider for scholarly publishers, helping them to publish and distribute their content online. We provide a range of services, including hosting, design, and digital marketing, as well as analytics and other tools to help publishers understand their audience and optimize their content. Science Alert works with a wide variety of publishers, including academic societies, universities, and commercial publishers.

Follow Us
© Copyright Science Alert. All Rights Reserved