Premium Essay

Media Steganography

Submitted By
Words 563
Pages 3
Terrorist groups use media as a resourceful tool to influence society in order to have a greater impact for their cause. As a result, it creates a power struggle of tension between many different sectors of society, such as, Government, Police, and Security Forces. Whoever controls the media controls what information society receives, therefore, depicting society’s morals as to what is right and what is wrong. As technology continues to advance so does social media, such as: chat rooms, blogs, YouTube, Facebook, Twitter, and etc., as a result, the media gives terroristic groups the ability to completely control their message and how it is perceived. (Pg 79, 81) In the past mass media was received thru newspapers, radio, and television, however, the readily available instant communication offered thru social media, allows for members of society to receive updates and information quicker than having to wait for the news to come on, or the paper to be delivered. (Pg 80) …show more content…
(Pg 82) That is not to include one of the “Internet’s greatest vulnerabilities” that terrorist and criminals are capable of and that is steganography. Steganography is the ability to embed encrypted messages within an internet site, therefore, it gives terrorist groups the opportunity to hack security forces or other organization databases and steal information for their own benefit. (Pg 83) This causes a great deal of tension with security forces as they are always having to take measures to insure their intel information is not released to terrorist groups or

Similar Documents

Free Essay

Steganography

...International Journal of Computer Applications (0975 – 8887) Volume 9– No.7, November 2010 Steganography- A Data Hiding Technique Arvind Kumar Assistant Professor Vidya College of engineering, Meerut, India Km. Pooja Vankateshwara institute of computer Science and technology, Meerut, India ABSTRACT Steganography is the art of hiding information and an effort to conceal the existence of the embedded information. It serves as a better way of securing message than cryptography which only conceals the content of the message not the existence of the message. Original message is being hidden within a carrier such that the changes so occurred in the carrier are not observable. In this paper we will discuss how digital images can be used as a carrier to hide messages. This paper also analyses the performance of some of the steganography tools. Steganography is a useful tool that allows covert transmission of information over an over the communications channel. Combining secret image with the carrier image gives the hidden image. The hidden image is difficult to detect without retrieval. This paper will take an in-depth look at this technology by introducing the reader to various concepts of Steganography, a brief history of Steganography and a look at some of the Steganographic technique. In steganography, the possible cover carriers are innocent looking carriers (images, audio, video, text, or some other digitally representative code) which will hold the hidden information...

Words: 3246 - Pages: 13

Free Essay

Steganography

...Steganography Hide and Seek: An Introduction to Steganography Although people have hidden secrets in plain sight— now called steganography—throughout the ages, the recent growth in computational power and technology has propelled it to the forefront of today’s security techniques. N IELS PROVOS AND PETER HONEYMAN University of Michigan teganography is the art and science of hiding communication; a steganographic system thus embeds hidden content in unremarkable cover media so as not to arouse an eavesdropper’s suspicion. In the past, people used hidden tattoos or invisible ink to convey steganographic content. Today, computer and network technologies provide easy-to-use communication channels for steganography. Essentially, the information-hiding process in a steganographic system starts by identifying a cover medium’s redundant bits (those that can be modified without destroying that medium’s integrity).1 The embedding process creates a stego medium by replacing these redundant bits with data from the hidden message. Modern steganography’s goal is to keep its mere presence undetectable, but steganographic systems— because of their invasive nature—leave behind detectable traces in the cover medium. Even if secret content is not revealed, the existence of it is: modifying the cover medium changes its statistical properties, so eavesdroppers can detect the distortions in the resulting stego medium’s statistical properties. The process of finding these distortions is called...

Words: 8940 - Pages: 36

Free Essay

Steganography: a Review of Information Security Research and Development in Muslim World

...Steganography: A Review of Information Security Research and Development in Muslim World Abstract Conveying secret information and establishing hidden relationship has been a great interest since long time ago. Therefore, there are a lot of methods that have been widely used since long past. This paper reviewed one of the methods for establishing hidden communication in information security and has gained attraction in recent years that is Steganography. Steganography is the art and science of hiding a secret message in a cover media such as image, text, signals or sound in such a way that no one, except the intended recipient knows the existence of the data. In this paper, the research and development of steganography from three years back starting from 2010 until recently, 2013 in Muslim world are reviewed. The future research in the field of Steganography is briefly discussed. Keywords Cover Image, Stego Image, Cryptography, Steganography, Information Hiding, Information Security, Muslim World 1 Introduction In today’s information technology era, the internet has played a vital part in the communication and information sharing. Due to the rapid development in Information Technology and Communication and the Internet, the security of the data and the information has raised concerned. Every day, confidential data has been compromised and unauthorized access of data has crossed the limits. Great measures should be taken to protect the data and information [5,...

Words: 3746 - Pages: 15

Free Essay

Information Hiding - Steganography

...Information Hiding – Steganography Steganography Types and Techniques Abstract— Information hiding has been one of the most crucial element of information technology in recent years. Unlike Cryptography, Steganography does not only keep the content of information secret, its also keeps the existence of the information secret. This is achieved by hiding information behind another information. This paper gives an overview of Steganography and its techniques, types, and also its advantages and disadvantages. Keywords-component; steganography; information hiding; security; confidentiality; techniques. INTRODUCTION Steganography help hides the fact that communication is taking place by hiding some information behind another information thereby making the communication invisible. The origin of the word “steganography” is from the Greek words “steganos” and “graphia” which is interpreted as “covered” and “writing” respectively thereby defining steganography as “covered writing”. Steganography and cryptography are both part of information hiding but neither alone is without flaws. The goal of steganography is defeated once the hidden message is found or noticed even while still in the original message (carrier). For safely transmission of hidden messages or information in steganography, multimedia files like audio, video and images are mostly used has the carrier or cover source. METHODOLOGY The Methodology used for this paper is based on the...

Words: 1519 - Pages: 7

Free Essay

Watermarking: Legalities of Digital Media

...Watermarking: Legalities of Digital Media Derrick Harper Course name and number Instructor name Outline I. Introduction II. History III. The Basics of Watermarking IV. Watermarking Applications V. A Simple Watermark: Patchwork VI. Current Work in Watermarking VII. Conclusion VIII. Works Cited Introduction It's no news to anyone that's reading this that the meteoric rise of the Internet in recent years has significantly increased the availability of all forms of media. Nowhere is this more obvious than in the realm of commercial musical recordings, where Napster and other internet-based distribution systems have made incredible volumes of musical content widely available, all without the consent of the music's originators. This situation, though, is not unique to the music industry, as photographers, filmmakers, and other content-originators all have the same problem to varying degrees. The solution, and even the need for a solution, to this problem of copyright infringement is still a topic that is open to great debate, but there is no debating the fact that some interesting and novel technology has been designed to help. Digital image watermarking, the practice of secretly embedding a piece of information in an image, is one of the more interesting of these technologies, and deserves some consideration. It is the purpose of this paper to give the reader an overview of watermarking and the diverse benefits that it offers. We begin with a brief...

Words: 3166 - Pages: 13

Premium Essay

Security Issues and Principles Research Paper

...SECURITY ISSUES AND PRINCIPLES STEGANOGRAPHY [n. stə nóggrəfi] Steganography (literally meaning covered writing) dates back to ancient Greece, where common practices consisted of etching messages in wooden tablets and covering them with wax, and tattooing a shaved messenger's head, letting his hair grow back, and then shaving it again when he arrived at his contact point. Steganography comes from the Greek steganos, or "covered," and graphie, or "writing". Synonymous to abstraction, the art and science of hiding information by embedding messages within other, seemingly harmless messages. Steganography takes cryptography a step farther by hiding an encrypted message so that no one suspects it exists. Ideally, anyone scanning your data will fail to know it contains encrypted data by replacing bits of useless or unused data in regular computer files (such as graphics, sound, text, HTML, or even floppy disks ) with bits of different, invisible information. This hidden information can be plain text, cipher text, or even images. Steganography sometimes is used when encryption is not permitted or, more commonly, is used to supplement encryption. An encrypted file may still hide information using steganography, so even if the encrypted file is deciphered, the hidden message is not seen. In modern digital steganography, data is first encrypted by the usual means and then inserted, using a special algorithm, into redundant (that is, provided but unneeded) data that is part of a particular...

Words: 6118 - Pages: 25

Free Essay

Is4670 Week 3 Lab

...Week 3 Laboratory Week 3 Lab Part 1: Automate Digital Evidence Discovery Using Paraben’s P2 Commander Learning Objectives and Outcomes Upon completing this lab, students will be able to complete the following tasks: * Open an existing case file using P2 Commander * Analyze the data in the image and the files saved in the case * Sort and identify evidence file types in a case using Paraben's P2 Commander forensic tool * Use P2 Commander to identify information for potential evidence contained in chat logs such as Skype chat * Analyze the contents of user profiles and data using the P2 Commander browser Week 3 Lab Part 1 - Assessment Worksheet Overview View the Demo Lab available in the Practice section of Learning Space Unit 5 and then answer the questions below. The video will demonstrate the use of Paraben's P2 Commander and outline the different forensics capabilities of the tool. Lab Assessment Questions & Answers 1. When talking about Information Security, what does the 'CIA' stands for? CIA in information security stands for confidentiality, integrity and availability. 2. When would it be a good practice to classify data? It would be a good practice to classify data when you need to extract files from a hard drive or system for investigating in order to accurately organize the findings. 3. What is Security classification? Security classification is the security level assigned to a government document, file...

Words: 635 - Pages: 3

Free Essay

Watermark

...International Journal of Computer Applications (0975 – 8887) Volume 4– No.8, August 2010 Invisible Digital Watermarking Through Encryption Samir Kumar Bandyopadhyay Dept. of Computer Sc. & Engg, University of Calcutta 92 A.P.C. Road, Kolkata – 700009, India Tuhin Utsab Paul Dept. of Computer Sc. & Engg, University of Calcutta, 92 A.P.C. Road, Kolkata-700009, India Avishek Raychoudhury Dept. of Computer Sc. & Engg, University of Calcutta 92 A.P.C. Road, Kolkata-700009, India ABSTRACT Technique for hiding the data of images has been proposed in this paper. At the source, hidden (target image) is encoded within another image (cover image). Firstly, the cover image and the target image can be adjusted by resize function. Secondly, only the final encrypted image i.e. cover image and target image is sent over the network. This image is finally decoded at the receiver end. Received results are encouraging from practical point of view. keys, the relative entropy between encrypt and one specific decrypt key Yusuk Lim, Changsheng Xu and David Dagan Feng, 2001, developed the web based authentication system. In case of watermark embedding system, it is installed in the server as application software that any authorized user, who has access to server, can generate watermarked image. The distribution can use any kind of network transmission such as FTP, email etc. Once image is distributed to externally, client can access to authentication web page to get verification of...

Words: 2120 - Pages: 9

Premium Essay

Engl 102 Db 1

...American culture relies heavily on media, and that is not as valuable to learning as literature. I completely agree. It stated that an American child from age five to age eighteen has viewed over 20,000 hours of television and electronic media. That is an abundant amount of time spent doing that opposed to spending time doing homework and studying. There needs to be more of a balance in the use of electronic curriculum and traditional curriculum. I know that when I was a child, my family didn’t even have cable, so it was a real treat when I would get to watch a movie, or any television on the non-cable channels. My family pushed the importance of reading books, and figuring out the message in everything I read. Television and media is making us lazy. We rely too much on electronics to do the work for us. Television requires very little brain activity, which is why when we watch it, we tend to zone out, or easily forget what was just said. When watching television we only tap into the emotional side of our brain, and never think logically. Everything we learn from television goes into our short-term memory, but when we use traditional curriculum, we have to think and comprehend everything, which goes into our long-term memory. For me personally, I am a much better learner when I have to read and comprehend something on my own. To summarize, people are becoming more dependent on electronics. If we start to think on our own, without the help of the media, we will become better cognitive...

Words: 308 - Pages: 2

Premium Essay

Communication

...Also the difference in communication processes used in this crisis situation. The potential advantages and challenges associated with communicating within the organization. You will also read about the different media opportunities during the management crisis. As a director of a regional Emergency Management Office I have been receiving reports that the public water supplies of several towns in the area have become contaminated with life threating biological agents. It is my duty to address this to the organizations without causing a panic. I will allow one spoke’s person to talk about the crisis and answer any question. This spoke’s person will tell the truth and the facts and do it in a fast manner. I will also form a crisis team; the team will involve individuals who are the key to the crisis. Once the team is formed each team member will be educated on his or her responsibilities. I will also have the spokes person schedule a press conference with the media to inform the public what is going on. Also the spokes person will be someone who is comfortable in front of a TV and with reporters. I will also ask the Governor and Director of the Water Waste Manger to attend the press conference. I will take lead of the proper use of proper technology for instance social media, affecting communication throughout this crisis...

Words: 303 - Pages: 2

Premium Essay

Week 3 Communications Coordinator

...Communication Coordinator KelseyGeoghegan HCS/320 09/01/2014 Tracey Coble Communications Coordinator When you work as a Communications Coordinator for a national drug manufacturer who finds out there were negative effects that have been caused by one of the medications that is used by a huge population of people, it has to be handled carefully because there is so many lives are on the line. It does not matter if it is a popular person or not, organizations have to be prepared for negative issues that can happen at any time especially law suits. The communications Coordinator has to watch everything they say when it comes to having to talk to any news reporters or anyone you might have to speak to regarding the public figure reaction to the medications. There are so many different ways to communicate when in a facility or anywere face-to-face, being verbal, making phone calls, text messages, emails, or memos for sharing information within the company. Every person that works at any company should always be notified if there is any emergency or anything that is important and should be shared. Our reading text in Health Care Communication in Chapter 10 states “choose your words-and your medium-carefully, do not use email to communicate praise, advice, criticism, or critical information”. The Coordinator specialist should needs to do a whole organizational search and look for any patient with a phone number ay information to who ever took the medictions. They need...

Words: 446 - Pages: 2

Free Essay

From Local Market to International Frontier

...Pakistani culture. It is about cultural history and tradition story telling and passion. Truck art has been present in Pakistan's heritage for age . Today, this artistic media has reached it's culmination point with it's vibrant colours and craftmanship. As such every little adornment on a trucks has a special significance. As we know that our country is divided into different teritories so why not spread a message of a sovereign and united country with the theme pakistan on wheels. Each territory has it's distinct lifestyle. The culture and heritage of each province of Pakistan should be painted with intricate motifs and vibrant colours. Art motifs of such birds, fish and flower which depicts each province should be illustrated. Other than this famous scenic beauties like dyllic, bucolic scenes of streams, mountains or forest should be painted to embody each territory. The metal base of the truck always seem to make the multi-coloured truck transformed into a weak tea. So it could be covered with reflected stickers, scintillating tapes and further highlighted with mirrors and studs. For the finishing touches the intricately patterned crown carved in cedarwood should be placed at the top of the bus. This artistry employs a huge number of skilled labourers thus boosting the economy of the country. This artistic media is no more confined to Pakistan only but has spread it's splendor across borders and has become a tourism symbol of Pakistan.Thus we should make an effort to keep this...

Words: 264 - Pages: 2

Free Essay

Sourthern Discomfort

...NIC Final Exam Timetable 201501 (Trimester) Duration (mins) Reading Time (mins) Start Exam Start Exam End Room Principles of Marketing Surveying I Advanced Mathematics I Advanced Mathematics II Electrical Engineering I 180 180 180 180 180 10 10 0 0 10 9.00 9.00 9.00 9.00 9.00 9.10 9.10 9.00 9.00 9.10 12.10 12.10 12.00 12.00 12.10 GP3-18 GP3-18 GP3-20 GP3-20 GP3-20 CMNS1234 ICS001A Introduction to Digital Communication Intercultural Studies 60 150 0 10 2.00 2.00 2.00 2.10 3.00 4.40 GP3-20 * NNIC1000 A NIC-ECON1002 COM201A MATH1120 Communication & Literacy Stream A Macroeconomics for the Global Economy Communication Skills II Mathematics II 120 120 120 180 10 10 10 0 9.00 9.00 9.00 9.00 9.10 9.10 9.10 9.00 11.10 11.10 11.10 12.00 GP3-18 GP3-18 GP3-18 GP3-20 COM200A Communication Skills I 180 10 2.00 2.10 5.10 * NIC-IRHR1001 MATH1110 INFT1001 Managing the Organisation Mathematics I Foundations of Information Technology 150 180 180 10 0 10 9.00 9.00 9.00 9.10 9.00 9.10 11.40 12.00 12.10 GP3-18 GP3-20 GP3-20 HBI001A GENG1803 COM101A NIC-ACFI1002 Human Biology Introduction to Engineering Practice Programming Accounting Practice 120 180 120 180 10 10 10 10 2.00 2.00 2.00 2.00 2.10 2.10 2.10 2.10 4.10 5.10 4.10 5.10 GP3-18 GP3-18 ...

Words: 443 - Pages: 2

Premium Essay

Ray Rice

...technology, comes emergence in social media. The popularity of social media networking sites such as Facebook, Twitter, YouTube, Tumblr, Blogs and Instagram has taken the world by storm. Almost everyone in society has access to the internet. Although, the internet serves as a great source of information, it also has many other purposes. However, like every great thing in the world, there is a downside. One of the biggest benefits and downfalls of social media is the ability to share information to a broad audience, and if you’re the target of that information, it can easily ruin your life. If one person knows about the negative impact of social media, it’s Ray Rice. On September 8, 2014 Ray...

Words: 1713 - Pages: 7

Premium Essay

Lexle Alerts Case Study

...liability reasons, all approved messages must be verified by an email response showing approval. Templated Message: This is an emergency notification from Buncombe County HHS… • (_______________) has been verified by our agency. Please stay away from the area until law enforcement has cleared the area. • Due to hazardous weather conditions, Buncombe County will close offices at XXXXX . Please contact your supervisor with any questions. On call XXXXX should contact their supervisors with any concerns. After receiving a Nixle alert, employees can contact their supervisor if they have questions about the information provided or next steps. When an employee receives a Nixle alert, they are not to contact members of the news media or share the information via social media. Information on how to use Nixle to contact employees in the event of a public health emergency can be found in the BCHHS Crisis Communication Plan. Administrators designated to send Nixle alerts must register upon assignment of this duty and must keep their contact information up to date. Questions about this policy or about Nixle may be directed to hhsalert@buncombecounty.org or (828) 775-1321. ...

Words: 799 - Pages: 4