Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Cryptography and steganography : teaching experience
Sokół B., Yarmolik V. In Enhanced methods in computer security, biometric and artificial intelligence systems. London,  Springer-Verlag,  2005. Type:Book Chapter
Date Reviewed: Aug 21 2006

Steganography is the field of cryptography that studies how to send and detect messages that are hidden within other messages. Although its principles are readily applied to electronic media, it is not generally afforded the attention that other aspects of cryptography receive. Any treatment is, therefore, likely to be of interest. The authors, however, simultaneously do too much and too little. The length of the piece cannot do justice to the topics covered. The topics range over all of steganography, but there is no depth in any of them. Topics are covered only to the extent that readers will know that they exist. More importantly, the promise of teaching experiences is not fulfilled.

The chapter outlines steganographic techniques and principles, such as using the least significant bit in a graphic to hide a message, but it provides no practical examples. It mentions techniques for hiding messages in texts, and in audio and video files, but the authors do not give the reader any sense of them and their detection. In addition, the teaching is divorced from practice as much as the rest of the chapter. It is difficult to get a sense of exactly what the students did, how they did it, and what the impact was on their learning.

The bibliography provides a useful guide to the field, but the teaching practices alluded to are not developed enough to be of much use.

Reviewer:  Marlin Thomas Review #: CR133207 (0707-0692)
Bookmark and Share
  Reviewer Selected
Featured Reviewer
 
 
Data Encryption (E.3 )
 
 
Security and Protection (K.6.5 )
 
 
Introductory And Survey (A.1 )
 
Would you recommend this review?
yes
no
Other reviews under "Data Encryption": Date
ESA/390 integrated cryptographic facility
Yeh P., Ronald M. S. IBM Systems Journal 30(2): 192-205, 1991. Type: Article
Feb 1 1992
Design and implementation of an RSA cryptosystem using multiple DSP chips
Er M., Wong D., Sethu A., Ngeow K. Microprocessors & Microsystems 15(7): 369-378, 1991. Type: Article
Nov 1 1993
An introduction to cryptography
Diffie W. (ed), Hellman M., John Wiley & Sons, Inc., New York, NY, 1984. Type: Book (9780471262336)
Feb 1 1986
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy