stegnography part 2- - Hacking

Hot

Post Top Ad

Your Ad Spot

Tuesday 19 March 2019

stegnography part 2-





Rather than being incomprehensible to an unauthorized third party, as is the case with cryptography, steganography is designed to be hidden from a third party. Not only must the hidden data be discovered—considered a formidable task in and of itself—it must be encrypted, which can be nearly impossible.

One use of steganography includes watermarking which hides copyright information within a watermark by overlaying files not easily detected by the naked eye. This prevents fraudulent actions and gives copyright protected media extra protection.

There is some concern, sans definite proof, that the terrorists who plotted and deployed the 9/11 mission in New York City utilized steganography. This is what primarily brought the science of stenography front and center. Data can be stolen and encrypted through a file transfer or, more often than not, through email. And as with what has been suspected for 9/11, steganography can be used for secret communications that deal with terrorist plots.


On the lighter side, steganography usage has occurred in the military for decades, even if not computer based. One example was having a secret message was tattooed on a soldier’s shaved head. His hair would of course grow out and, once it did, he would have his hair shaved again only to reveal the hidden tattooed message to the designated recipient.

No comments:

Post a Comment