Subscribe Now Subscribe Today
Science Alert
 
Blue
   
Curve Top
Information Technology Journal
  Year: 2004 | Volume: 3 | Issue: 3 | Page No.: 245-269
DOI: 10.3923/itj.2004.245.269
 
Facebook Twitter Digg Reddit Linkedin StumbleUpon E-mail

Steganography-The Art of Hiding Data

Kefa Rabah

Abstract:
Given the shear volume of data stored and transmitted electronically in the world today, it is no surprise that countless methods of protecting such data have evolved. One lesser-known but rapidly growing method is steganography, the art and science of hiding information so that it does not even appear to exist. Moreover, in an ideal world we would all be able to openly send encrypted email or files to each other with no fear of reprisals. However, there are often cases when this is not possible, either because you are working for a company that does not allow encrypted emails or perhaps the local government does not approve of encrypted communication. This is one of the cases where Steganography can help hide the encrypted messages, images, keys, secret data, etc. This paper discusses the purpose of steganography. Explains how steganography is related to cryptography as well as what it can and cannot be used for. It also discusses a brief history of steganography. In addition, some of the tools and software used in steganography are demonstrated and including some discussion of the most popular algorithms involved in these tools. This paper further explains the advantages and disadvantages, as well as, strengths and weaknesses in the use of steganography.
PDF Fulltext XML References Citation Report Citation
 RELATED ARTICLES:
  •    Modeling Combo PR Generator for Stego Storage Self Test (SSST)
  •    Short Message (Service) as Key for Steganography
  •    Steganography-Time to Time: A Review
  •    A Novel Reversible Text Data Hiding Scheme
How to cite this article:

Kefa Rabah , 2004. Steganography-The Art of Hiding Data. Information Technology Journal, 3: 245-269.

DOI: 10.3923/itj.2004.245.269

URL: https://scialert.net/abstract/?doi=itj.2004.245.269

COMMENT ON THIS PAPER
 
 
 

 

 
 
 
 
 
 
 
 
 

 
 
 
 
 

Curve Bottom