CISSP: Certified Information Systems Security Professional Study Guide by Gibson Darril & Chapple Mike & Stewart James M
Author:Gibson, Darril & Chapple, Mike & Stewart, James M. [Gibson, Darril]
Language: eng
Format: mobi
Publisher: John Wiley and Sons
Published: 2012-06-13T23:00:00+00:00
Even though TLS has been in existence for more than a decade, many people still mistakenly call it SSL. For this reason, TLS has gained the nickname SSL 3.1.
Steganography and Watermarking
Steganography is the art of using cryptographic techniques to embed secret messages within another message. Steganographic algorithms work by making alterations to the least significant bits of the many bits that make up image files. The changes are so minor that there is no appreciable effect on the viewed image. This technique allows communicating parties to hide messages in plain sight—for example, they might embed a secret message within an illustration on an otherwise innocent web page.
Steganographers often embed their secret messages within images or WAV files because these files are often so large that the secret message would easily be missed by even the most observant inspector. Steganography techniques are often used for illegal or questionable activities, such as espionage and child pornography. However, they can also be used for legitimate purposes. Adding digital watermarks to documents to protect intellectual property is accomplished by means of steganography. The hidden information is known only to the file’s creator. If someone later creates an unauthorized copy of the content, the watermark can be used to detect the copy and (if uniquely watermarked files are provided to each original recipient) trace the offending copy back to the source.
Steganography is an extremely simple technology to use, with free tools openly available on the Internet. Figure 10.2 shows the entire interface of one such tool, iSteg. It simply requires that you specify a text file containing your secret message and an image file that you wish to use to hide the message. Figure 10.3 shows an example of a picture with an embedded secret message; the message is impossible to detect with the human eye.
FIGURE 10.2 Steganography tool
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7659)
Grails in Action by Glen Smith Peter Ledbrook(7575)
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 by Chris Gill(5934)
Azure Containers Explained by Wesley Haakman & Richard Hooper(5900)
Running Windows Containers on AWS by Marcio Morales(5409)
Kotlin in Action by Dmitry Jemerov(4924)
Microsoft 365 Identity and Services Exam Guide MS-100 by Aaron Guilmette(4553)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4327)
Combating Crime on the Dark Web by Nearchos Nearchou(4127)
The Age of Surveillance Capitalism by Shoshana Zuboff(3813)
The Ruby Workshop by Akshat Paul Peter Philips Dániel Szabó and Cheyne Wallace(3785)
Microsoft Cybersecurity Architect Exam Ref SC-100 by Dwayne Natwick(3674)
Learn Windows PowerShell in a Month of Lunches by Don Jones(3414)
Python for Security and Networking - Third Edition by José Manuel Ortega(3351)
Mastering Python for Networking and Security by José Manuel Ortega(3237)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3228)
Blockchain Basics by Daniel Drescher(3193)
The Ultimate Docker Container Book by Schenker Gabriel N.;(3024)
TCP IP by Todd Lammle(2883)
