收藏 分销(赏)

28Steganography.pptx

上传人:可**** 文档编号:1683140 上传时间:2024-05-07 格式:PPTX 页数:9 大小:744.50KB 下载积分:10 金币
下载 相关 举报
28Steganography.pptx_第1页
第1页 / 共9页
28Steganography.pptx_第2页
第2页 / 共9页


点击查看更多>>
资源描述
What is Steganography?defn:the art and science of hiding information by embedding it in some other data.cryptography-render message unintelligiblesteganography-conceal the existence of the messageSome History 1665-Steganographica,Gaspari Schotti 400 B.C.-writings of Herodotus1870-The Pigeon Post into Paris1499-“Steganographia”,Trithemius -steganography and magic2001-A Beautiful MindLow-tech Methods of Steganography Message hidden Message hidden as Message hidden as Message written in invisible ink ID#etched intoThe cover provides a host for transporting the hidden info.info embed -file extractinfoDigital Steganography HTML message as cover?computer program as cover?network protocol headers white space in text unused space in buffer least significant bits of image slight distortion in sound file“Easter eggs”Easter egg from the SimpsonsIn episode 7F19,Dustin Hoffman supplied the voice for Lisas substitute teacher,but was not credited on screen.Instead,they used the phony name Sam Etic.In the next season(episode 7F24),Michael Jackson supplied the voice for a man in an insane asylum that thought he was Michael Jackson.Due to contractualobligations,they were unable to give Jacksonon-screen credit.Instead,the show credited John Jay Smith,another person that doesnt exist.The egg lies in episode 9F09 when Lisa says,It was the greatest movie Ive ever seen in my life!And you wouldnt believe the celebrities who did cameos.Dustin Hoffman,Michael Jackson.of course they didnt use their real names,but you could tell it was them.Steganography in ImagesTwo types of compression:lossless(gif)lossy(jpeg)Sometimes concealed message inserted as a comment.Sometimes the accuracy of the image is sacrificed slightly.Common ToolsStegoDOSWhite Noise StormS-toolsoutguesssteghideThree Types of Steganography1)Covert Channelconceal message so only sender and recipient knowWatermarkingconcealed message contains its source ID 2)_ Watermarkingdesigned for concealed message to survive 3)(Semi-)_ Watermarkingdesigned so concealment is corrupted wheneverstego-file is modified.Applications of SteganographyCovert exchange of informationEstablish identityCombat illegal copyingSteg_How would you?Comparison of files for statistical differencesWhat files are available?
展开阅读全文

开通  VIP会员、SVIP会员  优惠大
下载10份以上建议开通VIP会员
下载20份以上建议开通SVIP会员


开通VIP      成为共赢上传

当前位置:首页 > 包罗万象 > 大杂烩

移动网页_全站_页脚广告1

关于我们      便捷服务       自信AI       AI导航        抽奖活动

©2010-2026 宁波自信网络信息技术有限公司  版权所有

客服电话:0574-28810668  投诉电话:18658249818

gongan.png浙公网安备33021202000488号   

icp.png浙ICP备2021020529号-1  |  浙B2-20240490  

关注我们 :微信公众号    抖音    微博    LOFTER 

客服