Professional Documents
Culture Documents
Information Age
Steganography Cryptography
Steganography
covered writing
is an art of hiding
information
Popular
contemporary
steganographic
technologies hide New York Times, August 3rd, 2001
information in
http://www.nytimes.com/images/2001/10/30/science/sci_STEGO_011030_00.jpg
images
Information Systems Research Center
Imageinwhichtohide Imagetohidewithinthe
anotherimage otherimage
Information Systems Research Center
http://www.cl.cam.ac.uk/~fapp2/steganography/image_downgrading /
October 17, 2002 Future Technology Briefing
Retrieving information from
pictures
Imagewithother Recreatedimage
hiddenwithin
Information Systems Research Center
http://www.cl.cam.ac.uk/~fapp2/steganography/image_downgrading /
October 17, 2002 Future Technology Briefing
Digital Watermarks
Source: http://www.digimarc.com
Steganography Cryptography
Substitution Transposition
Code
Cipher
Information Systems Research Center
functions
October 17, 2002 Future Technology Briefing
Digital Signatures
</PaymentInfo>
October 17, 2002 Future Technology Briefing
(Source: http://www-106.ibm.com/developerworks/xml/library/s-xmlsec.html/index.html)
XML Crypto document
Listing 2. Encrypted document where all but name is encrypted
<?xml version='1.0'?>
<PaymentInfo xmlns='http://example.org/paymentv2'>
<Name>John Smith<Name/>
<EncryptedData Type='http://www.w3.org/2001/04/xmlenc#Element'
xmlns='http://www.w3.org/2001/04/xmlenc#'>
<CipherData><CipherValue>A23B45C56</CipherValue></CipherData>
</EncryptedData>
</PaymentInfo>
Information Systems Research Center
(Source: http://www-106.ibm.com/developerworks/xml/library/s-xmlsec.html/index.html)
Data secrecy
Data integrity
Authentication of
message originator
Electronic certification
and digital signature
Non-repudiation
Source: http://www.princeton.edu/~hos/h398/matrix.jpg