Abstract
In this article we present overview of work with cryptography and steganography techniques, which refers to information hiding and providing secrecy. Article contains cryptography and steganography teaching results and experiences. First chapter contains information about steganography and its history. Next chapter provides information about hiding methods. We present there the most known, simple, computer-based steganographic techniques which our students mastered during studies. Third chapter includes information about few laboratory projects and results to the cryptography and steganography point. This chapter makes a review of several interesting steganography and cryptography approaches, which were implemented and become a subject of meticulous studies aimed at the development of new software.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
5. References
N.F. Johnson, Z. Duric, S. Jajodia: Information Hiding Steganography and Watermarking — Attacks and Countermeasures; Kluwer Academic Publishers, 2001.
S. Katzenbeisser, F.A.P. Petitcolas: Information Hiding — techniques for steganography and digital watermarking; Artech House, 2000
S. Singh: The code book. The science of secrecy from ancient Egypt to quantum cryptography. Swiat Ksiazki, 2003, pp. 19–21, 45.
D. Kahn: The Codebreakers. 2nd edition; Macmillan, 1996.
B. Norman: Secret Warfare; Acropolis Books, 1973.
Herodotus: The Histories, London, England: J.M. Dent & Sons, Ltd, 1992.
V.N. Yarmolik, Proceedings of CISIM 2003, Obfuscation, watermarking and tamper-proofing: modern approaches for software ownership protection.
C. Bancroft: Genomic Steganography: Amplifiable Microdots. Talk provided at Biomomolecular Computation Workshop: Its Potential and Applications, National Science Foundation, Arlington, Virginia, 1999.
C.T. Clelland, V. Risca, C. Bancroft: Hiding Messages in DNA Microdots. Nature, 399(6736):533–534,1999.
A. Gehani, T.H. LaBean, J.H. Reif: DNA-based Cryptography, in [11], 2000
E. Winfree, D.K. Gifford (eds.): DNA Based Computers V, Massachusetts Institute of Technology, June 1999, DIMACS Series in Discrete Mathematics and Theoretical Computer Science, vol. 54, American Mathematical Society, 2000.
E.H. Wilkins: A History of Italian Literature, London: Geoffrey Cumberlege, Oxford University Press, 1954, pp. 105–106.
A. Kerckhoffs: La Cryptographie Militaire, Journal des Sciences Militaires, vol. 9, Jan. 1883, pp. 5–38.
M. Roe: Cryptography and Evidence, Ph.D. thesis, University of Cambridge, Clare College, 1997.
R.J. Anderson, R.M. Needham, A. Shamir: The Steganographic File System, in Proceedings of the Second International Workshop on Information Hiding, vol. 1525 of Lecture Notes in Computer Science, Springer, 1998, pp. 73–82.
T.G. Handel, M.T. Stanford: III. Hiding Data in the OSI Network Model, in. Proceedings of the First International Workshop on Information Hiding, vol. 1174 of Lecture Notes in Computer Science, Springer-Verlag, 1996, pp. 23–38.
J. Lach, W.H. Mangione-Smith, M. Potkonjak: Enhanced Intellectual Property Protection for Digital Circuits on Programable Hardware, in. Proceedings of the Third International Workshop on Information Hiding, vol. 1768 of Lecture Notes in Computer Science, Springer-Verlag, 1999.
J. Brassil, L. O’Gorman, N.F. Maxembchuk, S.H. Low: Document Marking and Identification using Both Line and Word Shifting, Infocom, Boston, 1995, pp. 853–860.
P. Wayner: Disappearing Cryptography. Chestnut Hill, MA: Ap Professional, 1996.
C.H. Rowland: Convert Channels in the TCP/IP Protocol Suite, 1996.
R. Machado: “EzStego, Stego Online. Stego”, 1997.
A. Brown: “S-Tools for Windows”, 1996.
“StegoDos-Black Wolf’s Picture Encoder v0.90B,” 1993.
H. Hastur: “Mandelsteg”, 1994.
R. Arachelian: “White Noise Storm”, 1994.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer Science+Business Media, Inc.
About this paper
Cite this paper
Sokół, B., Yarmolik, V.N. (2005). Cryptography and Steganography: teaching experience. In: Pejaś, J., Piegat, A. (eds) Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems. Springer, Boston, MA. https://doi.org/10.1007/0-387-23484-5_8
Download citation
DOI: https://doi.org/10.1007/0-387-23484-5_8
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4020-7776-0
Online ISBN: 978-0-387-23484-7
eBook Packages: Computer ScienceComputer Science (R0)