CHAPTER 1
INTRODUCTION
STEGANOGRAPHY
Steganography is the art or practice of hiding a message, picture, or document inside another message, picture, or file. The term steganography is derived from the Greek words- stegano means "covered or else protected", in addition graphed signifies "writing" and combining these two Greek words defining it as “covered writing” [1]. Steganography is used to conceal the messages inside other harmless messages in a way that does not allow any enemy to even sense that there is a second secret message present in it. In the present electronic correspondence situation, information security is one of the significant difficulties. The need for a secure and robust communication between the communicating entities
…show more content…
The primary record of steganography showed up in the works of the Greek historian, Herodotus. The earliest documented utilizatons of steganography could easily be traced back the information to 440 B.C, Demaratus directed a notification around an unavoidable attack to Greece through writing the situation directly on the timber backing of a wax slab beforehand applying its beeswax surface [4]. Beeswax tablets were in identical manner which was utilized in earlier times as recyclable comprising surfaces, within a few amount of time it was made use for shorthand. In ancient Greece, people write messages on the wood, and then enclosed the message securely within the wood as a result of which an acquitted covering message was engraved. Greeks also documented a fascinating story about transporting strategic data above huge distance deprived of being noticeable. A ruler named Histiaeus utilized “stego” carrier by tattooing a message on the shaved head of the man. When his hair grew back, the prisoner was sent off to his target effectively, deprived of the message being distinguished. Over the course of the hundreds of years, numerous different strategies have been utilized as a part of fighting, in secret activities and to cover up illegal undertakings. In old China, messages were composed on silk, plunged in wax, and gulped [5]. Numerous societies have practiced steganography by writing messages using undetectable …show more content…
The conceivable spread transporters are blameless looking carriers (images, audio, video, text, or some other digitally representative code) which will hold the concealed data. A message is the data concealed and it may be plain text, cipher text, images, or anything that can be embedded into a bit torrent. It is composed of the cover carrier as well as the implanted message and it creates a stego-carrier. The concealing of data may oblige a stego key which is additional mystery data, for example, a secret word needed for implanting the information. When a secret message is hidden within a cover video, the subsequent item is a stego-video [6]. A conceivable equation of the procedure may be represented
The chance of being caught was a constant fear that ran through the minds of the Culper Ring. If one letter ended up in the wrong hands, the Culper Ring would have serious consequences. As a way to decrease the chances of the Culper Ring being caught, “Washington had obtained a supply of invisible ink… a vial precious substance for the writing of the Culper reports”. This invisible ink was crucial to the spies, as the letters blended in perfectly with normal printing paper, making it impossible for the British to read them. Since possessing a supply of the invisible ink, Tallmadge configured a code that was only understood by his fellow spies and Washington.
• ICMP; is one of the main rules of the internet protocol suite. It is used by system devices, like router, to send error messages showing, for example, that a demanded service is not offered or that a crowd or router could not be touched. • DHCP; Dynamic host configuration protocol is a customer server rules that repeatedly delivers an internet rules (IP) address and other linked arrangement information such as the subnet mask and avoidance entry. • Bluetooth; Bluetooth is a wireless communication technology that lets people to usefully connect their plans with other policies “and “the character of the technology is developing to not only allow devices to talk with one another, but actually allow the all-in-one communication between devices, native requests and the cloud.” •
(322). After each murder was committed, letters were recieved that provided details on the recent crime or mocked the police. The Zodiac Killer was known for sending various coded messages that taunted the police, or alarmed the people of California. (“The Zodiac Killer” Crime) However, even with the several letters and fingerprints left behind,
Their task was transmitting messages in secret
Most of the time Tallmadge would have a courier bring the messages that last part of the way, which would end with Washington getting the message. Even though, this process of getting the messages to Washington was very long, it was also very effective. The Culper Ring used codes and invisible ink to hide the messages and used numbers instead of names. “Even Washington was ignorant of the spies' identities” (Mount Vernon Staff). In those five years of the culper ring not even one of its spies were unmasked because of all the precautions they took.
From the very beginning, Washington stressed the importance of administrative secrecy and protection regarding the spy ring and within the spy ring itself. After Tallmadge recruited Robert Townsend, Washington was so concerned about security, he, “made it clear that he did not wish to know the person’s true identity or that of others involved in the ring’s activities.” The principle agents each wrote in invisible ink that require another chemical agent to reveal the writing. Due to the security risks presented by the rarity and costliness of the invisible ink or stain, Tallmadge created both fake names for most of the agents and a number code. The code Tallmadge used as a base for his code was a code which was itself based upon a priest’s cipher created in 1518 called the Ave Maria cipher.
This method is mostly effective and definitely more interesting than a possible scene that would just show them writing letters back in forth to each other. While it is technically not historically accurate, it is a good perception method used by the
They knew the letters were authentic because they would describe graphic descriptions of the murders that were never released to the public. The Zodiac signed all the letters with a symbol that resembles a target. During the time of the letters, he sent 4 cryptograms to different newspaper editors and said if anyone could decode them; the police could learn his identity. To date only 1 of the 4 have been deciphered and a local high school teacher did it at the time.
Tattooing has been around for nearly as long as humans have been. For example, the oldest revelation of tattooed human skin was found approximately 6000 BC on the upper lip of a Chinchorro culture mummy from South America. The oldest direct evidence for tattooing in Europe is the body of Ötzi the Iceman, which dates back to the late fourth millennium BC. The argument makes a claim of value, because she firmly states her opinions in defense of body art. The essay was written on the 6th of April in 2010.
“Women’s clothing made it easy to hide information… The many yards of fabric were perfect for hiding messages and papers, small packages and medical supplies easily attached to the frame of the hoop skirts…” (Harper). Again, because of the understanding of men not touching women, they easily transported information that way because no one thought to search women. Another trick used by Elizabeth Van Lew, and other spies, was using “an invisible ink to write their messages between the lines of “ordinary” letters” (Harper).
Tattoos have played a role in human societies since their inception, as pieces of cultures and rituals across the world. To many, having a tattoo is an outward way of expression. However, the prejudice have not disappeared and are still greatly diminishing. In the article Inked Well, David Kirby examines the aspects of tattoo’s history, as well as tattoo’s iconic popularity among today 's middle class. Kirby’s stereotypical views on the tattooed “victims” quickly change as he goes on to interview some local tattooes of Tallahassee, Florida.
Also, every message was destroyed once it was read. The text says,¨"walking carriers" of the code, and each written message that was read aloud by a Code Talker was immediately destroyed.” This shows, that they were extremely secretive about the code. To conclude, the code that the Code Talkers used during World War II was hard to
One of Rome's greatest leaders, Julius Caesar, was the first person to hand write a newpaper. The first newspaper wasn't actually on paper, It was on a small piece of wood, but eventually they found a better way of making newspapers, They did this by putting the writing on small slabs of stone, because it was easier to read and was written cleaner than on a piece of wood. They were often written with the earlier version of a pen or different writing utensils. The newspaper was a very good invention, it's also very helpful today.
The reader had to decipher the codes in order to receive the message. The code was a mix of numbers or letters that substituted for the actual letters in the message. Certain words, usually common places, names and dates would be given different words to be used instead. Tallmadge made four copies of the codes and gave them to Abraham Woodall, Robert Townsend and of course, George Washington. Woodall and Townsend also had code names.
The first cryptogram was solved by a highschool teacher, the cryptogram was interpreted to say, “ I LIKE KILLING PEOPLE BECAUSE IT IS SO MUCH FUN…” ( FBI, “The Zodiac Killer). These absolutely inappropriate messages were sent to inform a killing was about to occur or to claim that a killing was his. The most horrific letter was when he threatened to kill a bus full of school children, which what made him such a feared figure in northern