Introduction to Steganography
Steganography is the art of hiding information. While steganography has been used in various forms for thousands of years it has become more visible recently due to its application to hiding the plans and communications of terrorists and criminals, as well as extreme pornography, in seemingly harmless image, video and audio multimedia files for transmission over the Internet. This Webtorials presentation by Global Telecommunications Consultant James P. Cavanagh describes the basic concepts of steganography, its application to digital files, provides a stunning example and discusses some actions which can be taken to reduce the likelihood that your systems will be exploited. This Webtorial is designed to supplement the Introduction to Encryption Webtorial.
Multimedia
Presentation
(Approx. 28 Minutes) Recommended: Requires RealAudio G2 Player |
|||
Basic Slideshow For all browsers |
|||
Presentation
Handout
(Approx. 740 kB) Adobe Acrobat (.pdf) format handout for printing / viewing.
|
Jim
Cavanagh, The Consultant Registry Mr. Cavanagh is the editor of books on multimedia networking and network security, as well as author of Frame Relay Applications: Business and Technology Case Studies. He is currently writing a book on network and infrastructure security, as well as ramping up his training and consulting efforts in the area of network and infrastructure security. Mr. Cavanagh is also a frequent guest on panels at industry conferences, has been an instructor for the International Communications Association's (ICA) Summer Program at the University of Colorado at Boulder since 1992. Additionally, Mr. Cavanagh provides training on ATM, Frame Relay, Emerging Technologies, LAN and TCP/IP Integration, Telecom and Datacom Fundamentals and a variety of other subjects. |
|
Copyright, Credits, and Disclaimers Copyright for both the content and the presentation are retained by the presenter, and the presentation was recorded at the presenter's request. Copyright, 2001 - Distributed Networking Associates. All portions of this presentation are copyrighted by Distributed Networking Associates and/or the organization credited as the source of information. All forms of reproduction and/or recording, including photocopying, tape recording, and video taping are strictly prohibited without the express prior written permission of Distributed Networking Associates. Clipart used may include images from Corel, Broderbund, and IMSI. Professional Opinions - All information presented and opinions expressed by Distributed Networking are the current opinions of Distributed Networking based on professional judgment and best available information at the time of presentation. Consequently, the information is subject to change, and no liability for advice presented is assumed. Ultimate responsibility for choice of appropriate solutions remains with the Customer.Please note: By downloading this information, you acknowledge that the sponsor(s) of this information may contact you, providing that they give you the option of opting out of further communications from them concerning this information. Also, by your downloading this information, you agree that the information is for your personal use only and that this information may not be retransmitted to others or reposted on another web site. Please encourage colleagues to download their own copy after registering at http://www.webtorials.com/reg/. |