Table 1. The main tasks solved by open steganography..
Table 1. Main tasks solved by open steganography
Task | Technology and solutions | Description of an implementation example | Application areas |
Protection of confidential information from unauthorized access | Embedding hidden information into publicly available multimedia information | For a detailed description of the practical implementation, see below. 1 second of digitized audio (44100 Hz, 8 bit, stereo) allows hiding 5 pages of text information, while the change in sample values is 1% | Military and other applications, as well as use in cases where cryptography cannot be used |
Overcoming Network Resource Monitoring and Management Systems | Stegomethods aimed at countering industrial espionage make it possible to resist control over information in computer networks | The Hacktivismo group has released the Camera/Shy utility, which runs on the Internet Explorer browser, leaving no history of activity in it, using the LSB steganography technique and the AES encryption algorithm with a 256-bit key, operates very quickly and allows you to hide messages in gif files. In addition, this program is also capable of automatically scanning HTML pages for graphic images with hidden information. | According to the authors, this program was created “to bypass national firewalls, which makes it possible to safely exchange any digital content over the Internet” |
Software camouflage | In cases where the use of software is limited, it can be camouflaged as standard programs or hidden in multimedia files | Official editors, sound, advertising, etc. are used. | Multi-level authorized access to software is provided |
Protection of copyright on intellectual property from copying and authentication | Digital watermarks (DW) and identification numbers (IN) technologies are used. | DWs are embedded in the protected object and can be either visible or invisible. They contain an authentic code, information about the owner, and control information. The difference between IN and DVZ is that each copy has its own IN (fingerprint technology) | DVZ and IN technologies are used to protect electronic media from copying and unauthorized use of information in e-commerce, voice mail, video surveillance systems, and office work |
Hidden annotation of documents and optimization of databases (information) | DVZ and IN technologies are used | For example, information in electronic medical documents accessible only to the attending physician | Used for hidden annotation of documents in medicine, cartography, multimedia databases, as well as for searching for the necessary information in them |