Steganography

Steganography

Merrill Warkentin (Mississippi State University, USA), Mark B. Schmidt (St. Cloud State University, USA) and Ernst Bekkering (Northeastern State University, USA)
Copyright: © 2007 |Pages: 7
DOI: 10.4018/978-1-59140-991-5.ch007
OnDemand PDF Download:
$37.50

Abstract

Steganography, the process of hiding information, can be used to embed information or messages in digital files. Some uses are legitimate, such as digital watermarking or the combination of text with medical images. But the technique can also be used for criminal purposes or by terrorists to disguise communications between individuals. We discuss some commonly available steganographic tools, the detection of stegonography through steganalysis, and future challenges in this domain. In the future, the legality of steganography may depend on legal issues and challenges. Jurisdictional differences may play a role. Privacy will have to be balanced by the duty of authorities to safeguard public safety, both from threats by criminals and terrorists. Techniques for steganalysis will become increasingly important, and will be complicated by the use of the Internet and emerging technologies such as VOIP. Packet routing complicates analysis of files, and new data streams offer new opportunities for hiding information. An internationally coordinated response to threats may be necessary.

Complete Chapter List

Search this Book:
Reset