[Table of Contents]  [previous]  [next]
Next Section: 2.2 Steganography History

2. Steganography

2.1 Definition

The word steganography literally means covered writing as derived from Greek. It includes a vast array of methods of secret communications that conceal the very existence of the message. Among these methods are invisible inks, microdots, character arrangement (other than the cryptographic methods of permutation and substitution), digital signatures, covert channels and spread-spectrum communications.

"Steganography is the art and science of communicating in a way which hides the existence of the communication. In contrast to cryptography, where the enemy is allowed to detect, intercept and modify messages without being able to violate certain security premises guaranteed by a cryptosystem, the goal of steganography is to hide messages inside other harmless messages in a way that does not allow any enemy to even detect that there is a second secret message present" [Markus Kuhn 1995-07-03].

David Kahn places steganography and cryptography in a table to differentiate against the types and counter methods used. Here security is defined as methods of "protecting" information where intelligence is defined as methods of "retrieving" information [Kahn67]:


Signal SecuritySignal Intelligence
Communication SecurityCommunication Intelligence
  • Steganography (invisible inks, open codes, messages in hollow heels) and Transmission Security (spurt radio and spread spectrum systems)
  • Interception and direction-finding
  • Cryptography(codes and ciphers)
  • Cryptanalysis
  • Traffic security(call-sign changes, dummy messages, radio silence)
  • Traffic analysis (direction-finding, message-flow studies, radio finger printing)
Electronic Security Electronic Intelligence
  • Emission Security (shifting of radar frequencies, spread spectrum)
  • Electronic Reconnaissance (eaves-dropping on radar emissions)
  • Counter-Countermeasures "looking through" (jammed radar)
  • Countermeasures (jamming radar and false radar echoes)
Table 1: Kahn's Security Table

 [Table of Contents]  [previous]  [next]
Next Section: 2.2 Steganography History

Copyright, ©1995-2000 Neil F. Johnson. All Rights Reserved. Send comments to njohnson(at)gmu(dot)edu.
Association of Internet Professionals
Member
The author is a member of
The HTML Writers Guild