Sunday, March 15, 2009

Introduction to Steganography

Steganography is the art of concealing the presence of information within an innocuous container. Steganography has been used throughout history to protect important information from being discovered by enemies. A very early example of Steganography comes from the story of Demartus of Greece. He wished to inform Sparta that Xerces the King of Persia was planning to invade. In ancient Greece wax covered wooden tablets were used to record written text. In order to avoid detection by the Persians, Demartus scraped the wax from a tablet, etched the message into the underlying wood, then recovered the tabled with wax. This concealed the underlying message from the sentries who inspected the tablets as they left Persia by courier for Greece.


Another historical exampls of Steganography are the use of invisible inks. A common experiment conducted by young kids everywhere is to use a toothpick dipped in vinegar to write a message on a piece of paper. Once the vinegar dries, the presence of the message is not obvious to a casual inspector (aside from the smell). Upon slight heating of the paper, a chemical reaction occurs which darkens the vinegar and makes the message readable. Other, less smelly, invisible inks have been used throughout history similarly even up until World War II.


A more recently developed Steganography technique was invented by the Germans in World War II, the use of microdots. Microdots were very small photographs, the size of a printed period, which contain very clear text when magnified. These microdots contained important information about German war plans and were placed in completely unrelated letters as periods.


Although Steganography is related to Cryptography, the two are fundamentally different.

1 comment:

Unknown said...

Awesome introduction about this security technique is posted in this article. Its a very powerful security which is basically used to protect the information as well as the sender of the information. You have quoted some very good examples in this article.
digital certificate