Breaking Hackers' Codes Essay

Total Length: 559 words ( 2 double-spaced pages)

Total Sources: 1

Page 1 of 2

Steganography or "the process of embedding secret information into an innocent-looking carrier" has recently attracted new media attention because of a number of recent hacking attempts. However, the process is an old one which predates computers. "It should not be surprising that the first written report of the use of steganography is attributed to the Greek historian Herodotus. The reported method involved camouflaging a secret message within a hare corpse" (Zieli-ska, Mazurczyk, & Szczypiorski 2014). Linguistic steganography also has been popular for many decades, in which a hidden meaning is transmitted through words. "Linguistic steganography may be derived from the aforementioned technique of textual steganography, as it relies on the manipulations on the written (possibly even spoken) language with the aim of tricking the perception of an unaware dupe" (Zieli-ska, Mazurczyk, & Szczypiorski 2014).

Attempts to decode steganography attempts have increased in intensity in recent years due to businesses concerns about DRM (Digital Rights Management) and "the alleged utilization of the steganographic methods by terrorists while planning the attacks on U.S. On September 11, 2001" (Zieli-ska, Mazurczyk, & Szczypiorski 2014).
Steganography is usually transmitted via a third party carrier who is unaware of what he or she is transmitting: the more innocent-appearing and popular the source, the better. However, there are some legitimate uses of the technique, including attempts to circumvent censorship; legitimate attempts to avoid detection via tracing; and also copyright protection (Zieli-ska, Mazurczyk, & Szczypiorski 2014).

The most common form of steganography in the modern area remains visually-altered, digital steganography. "Digital image steganography is mostly oriented toward tricking the human visual system into believing the perception of the image has not been manipulated in any….....

Show More ⇣


     Open the full completed essay and source list


OR

     Order a one-of-a-kind custom essay on this topic


sample essay writing service

Cite This Resource:

Latest APA Format (6th edition)

Copy Reference
"Breaking Hackers' Codes" (2014, September 16) Retrieved June 16, 2024, from
https://www.aceyourpaper.com/essays/breaking-hackers-codes-191836

Latest MLA Format (8th edition)

Copy Reference
"Breaking Hackers' Codes" 16 September 2014. Web.16 June. 2024. <
https://www.aceyourpaper.com/essays/breaking-hackers-codes-191836>

Latest Chicago Format (16th edition)

Copy Reference
"Breaking Hackers' Codes", 16 September 2014, Accessed.16 June. 2024,
https://www.aceyourpaper.com/essays/breaking-hackers-codes-191836