Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Cyber warfare: steganography vs. steganalysis
Wang H., Wang S. Communications of the ACM47 (10):76-82,2004.Type:Article
Date Reviewed: Oct 26 2004

Methods of steganography, hiding information within images, and steganalysis, detecting the presence of hidden messages within images, are described in this article. The authors compare and contrast two forms of steganography, focusing mainly on techniques for transmitting secret messages, but also addressing applications such as watermarking, when the fact that there is hidden content does not need to be concealed, but it is necessary to make sure that the hidden content is not destroyed or affected by manipulations, such as compression techniques. For steganalysis, note that the focus is only on detection. The task of interpreting the content falls in the domain of cryptography. Visual and statistical methods are discussed. The authors suggest that there is an ongoing battle, a cyber-war, between those who would hide information, and those who need to detect and stop the practice. No specific instances of the use of these techniques are mentioned.

The article is excellent at providing general descriptions of approaches; listing available tools, with sources, for steganography and current methods for steganalysis; and providing references. However, there is little explanation in sufficient depth for someone unfamiliar with this topic to gain understanding. Even for least-significant-bit modification, the discussion of an example shown with a figure is not clear. The layout of the article, specifically the compressed tables and figures, does not serve its readers well.

Reviewer:  Jeanine Meyer Review #: CR130336 (0504-0458)
Bookmark and Share
  Reviewer Selected
Featured Reviewer
 
 
Visual Programming (D.1.7 )
 
 
Electronic Commerce (K.4.4 )
 
 
Organizational Impacts (K.4.3 )
 
 
Public Policy Issues (K.4.1 )
 
 
Social Issues (K.4.2 )
 
 
Computers In Other Systems (J.7 )
 
  more  
Would you recommend this review?
yes
no
Other reviews under "Visual Programming": Date
Visual programming in data flow environments (videotape)
Upson C., University Video Communications, Stanford, CA, 1992. Type: Book
Apr 1 1993
Windows 95 programming with custom controls
Cilwa P., Coriolis Group Books, Scottsdale, AZ, 1996. Type: Book (9781883577735)
Feb 1 1997
Visual language theory
Marriott K. (ed), Meyer B. (ed), Springer-Verlag New York, Inc., New York, NY, 1998. Type: Book (9780387983677)
May 1 2000
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy