Skip to main content

Abstract

In this article we present overview of work with cryptography and steganography techniques, which refers to information hiding and providing secrecy. Article contains cryptography and steganography teaching results and experiences. First chapter contains information about steganography and its history. Next chapter provides information about hiding methods. We present there the most known, simple, computer-based steganographic techniques which our students mastered during studies. Third chapter includes information about few laboratory projects and results to the cryptography and steganography point. This chapter makes a review of several interesting steganography and cryptography approaches, which were implemented and become a subject of meticulous studies aimed at the development of new software.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

5. References

  1. N.F. Johnson, Z. Duric, S. Jajodia: Information Hiding Steganography and Watermarking — Attacks and Countermeasures; Kluwer Academic Publishers, 2001.

    Google Scholar 

  2. S. Katzenbeisser, F.A.P. Petitcolas: Information Hiding — techniques for steganography and digital watermarking; Artech House, 2000

    Google Scholar 

  3. S. Singh: The code book. The science of secrecy from ancient Egypt to quantum cryptography. Swiat Ksiazki, 2003, pp. 19–21, 45.

    Google Scholar 

  4. D. Kahn: The Codebreakers. 2nd edition; Macmillan, 1996.

    Google Scholar 

  5. B. Norman: Secret Warfare; Acropolis Books, 1973.

    Google Scholar 

  6. Herodotus: The Histories, London, England: J.M. Dent & Sons, Ltd, 1992.

    Google Scholar 

  7. V.N. Yarmolik, Proceedings of CISIM 2003, Obfuscation, watermarking and tamper-proofing: modern approaches for software ownership protection.

    Google Scholar 

  8. C. Bancroft: Genomic Steganography: Amplifiable Microdots. Talk provided at Biomomolecular Computation Workshop: Its Potential and Applications, National Science Foundation, Arlington, Virginia, 1999.

    Google Scholar 

  9. C.T. Clelland, V. Risca, C. Bancroft: Hiding Messages in DNA Microdots. Nature, 399(6736):533–534,1999.

    Article  Google Scholar 

  10. A. Gehani, T.H. LaBean, J.H. Reif: DNA-based Cryptography, in [11], 2000

    Google Scholar 

  11. E. Winfree, D.K. Gifford (eds.): DNA Based Computers V, Massachusetts Institute of Technology, June 1999, DIMACS Series in Discrete Mathematics and Theoretical Computer Science, vol. 54, American Mathematical Society, 2000.

    Google Scholar 

  12. E.H. Wilkins: A History of Italian Literature, London: Geoffrey Cumberlege, Oxford University Press, 1954, pp. 105–106.

    Google Scholar 

  13. A. Kerckhoffs: La Cryptographie Militaire, Journal des Sciences Militaires, vol. 9, Jan. 1883, pp. 5–38.

    Google Scholar 

  14. M. Roe: Cryptography and Evidence, Ph.D. thesis, University of Cambridge, Clare College, 1997.

    Google Scholar 

  15. R.J. Anderson, R.M. Needham, A. Shamir: The Steganographic File System, in Proceedings of the Second International Workshop on Information Hiding, vol. 1525 of Lecture Notes in Computer Science, Springer, 1998, pp. 73–82.

    Google Scholar 

  16. T.G. Handel, M.T. Stanford: III. Hiding Data in the OSI Network Model, in. Proceedings of the First International Workshop on Information Hiding, vol. 1174 of Lecture Notes in Computer Science, Springer-Verlag, 1996, pp. 23–38.

    Google Scholar 

  17. J. Lach, W.H. Mangione-Smith, M. Potkonjak: Enhanced Intellectual Property Protection for Digital Circuits on Programable Hardware, in. Proceedings of the Third International Workshop on Information Hiding, vol. 1768 of Lecture Notes in Computer Science, Springer-Verlag, 1999.

    Google Scholar 

  18. J. Brassil, L. O’Gorman, N.F. Maxembchuk, S.H. Low: Document Marking and Identification using Both Line and Word Shifting, Infocom, Boston, 1995, pp. 853–860.

    Google Scholar 

  19. P. Wayner: Disappearing Cryptography. Chestnut Hill, MA: Ap Professional, 1996.

    Google Scholar 

  20. C.H. Rowland: Convert Channels in the TCP/IP Protocol Suite, 1996.

    Google Scholar 

  21. R. Machado: “EzStego, Stego Online. Stego”, 1997.

    Google Scholar 

  22. A. Brown: “S-Tools for Windows”, 1996.

    Google Scholar 

  23. “StegoDos-Black Wolf’s Picture Encoder v0.90B,” 1993.

    Google Scholar 

  24. H. Hastur: “Mandelsteg”, 1994.

    Google Scholar 

  25. R. Arachelian: “White Noise Storm”, 1994.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer Science+Business Media, Inc.

About this paper

Cite this paper

Sokół, B., Yarmolik, V.N. (2005). Cryptography and Steganography: teaching experience. In: Pejaś, J., Piegat, A. (eds) Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems. Springer, Boston, MA. https://doi.org/10.1007/0-387-23484-5_8

Download citation

  • DOI: https://doi.org/10.1007/0-387-23484-5_8

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-1-4020-7776-0

  • Online ISBN: 978-0-387-23484-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics