Abstract
In this age of universal electronic
connectivity, of viruses and hackers, of electronic eavesdropping and
electronic fraud, there is indeed no time at which security of information does
not matter. The explosive growth of computer systems and their interconnections
via networks has increased the dependency on the information stored and
communication using these systems. This has led to a heightened awareness of
the need to protect the data transmitted.
Thus the field of cryptography has
got more attention nowadays. More and more complex techniques for encrypting
the information are proposed every now and then. Some advanced encryption
algorithms like RSA, DES; AES etc. which are extremely hard to crack have been
developed. But, as usual, when a small step is made to improve the security,
more work is done in the opposite direction by the hackers to break it. Thus
they are able to attack most of these algorithms and that too, successfully.
Even complex algorithms like RSA are no exception to this.
So, to deceive the hackers, people
have started to follow a technique called ‘Steganography’. It is not an
entirely new technique and has been in the practice from ancient times. In this
method, the data is hidden behind unsuspecting objects like images, audio,
video etc. so that people cannot even recognize that there is a second message
behind the object. Images are commonly used in this technique.
No comments:
Post a Comment