

Steganography_medium = hidden_message + carrier + steganography_keyįigure 1. The use of a steganography key may be employed for encryption of the hidden message and/or for randomization in the steganography scheme.

The secret message is embedded in the carrier to form the steganography medium. The steganography process generally involves placing a hidden message in some transport medium, called the carrier. Steganography hides the covert message but not the fact that two parties are communicating with each other. Microdots and microfilm, a staple of war and spy movies, came about after the invention of photography (Arnold et al. Invisible ink has been in use for centuries-for fun by children and students and for serious espionage by spies and terrorists. In ancient times, messages were hidden on the back of wax writing tables, written on the stomachs of rabbits, or tattooed on the scalp of slaves. Nevertheless, this paper will treat steganography as a separate field.Īlthough the term steganography was only coined at the end of the 15th century, the use of steganography dates back several millennia. Although steganography is separate and distinct from cryptography, there are many analogies between the two, and some authors categorize steganography as a form of cryptography since hidden communication is a form of secret writing (Bauer 2002). This differs from cryptography, the art of secret writing, which is intended to make a message unreadable by a third party but does not hide the existence of the secret communication. The purpose of steganography is covert communication to hide a message from a third party. Steganography is the art of covered or hidden writing.
#Free download outguess for mac software#
Examples of software tools that employ steganography to hide data inside of other files as well as software to detect such hidden files will also be presented. Although this paper provides a historical context for steganography, the emphasis is on digital applications, focusing on hiding information in online image or audio files. It is directed at forensic computer examiners who need a practical understanding of steganography without delving into the mathematics, although references are provided to some of the ongoing research for the person who needs or wants additional detail. This paper is intended as a high-level technical introduction to steganography for those unfamiliar with the field. The purpose of steganography is covert communication-to hide the existence of a message from a third party. Research and Technology An Overview of Steganography for the Computer Forensics ExaminerĪbstract | Introduction | Null Ciphers | Digital Image and Audio Digital Carrier MethodsĮxamples | Detecting Steganography | Tools | Summary and Conclusions | ReferencesĪdditional Websites | Companion Downloads | Commercial Vendors Forensic Science Communications - July 2004
