Conclusion

In and of itself, steganography is not a good solution to secrecy, but neither is simple substitution and short block permutation for encryption. But if these methods are combined, you have much stronger encryption routines (methods).

 


For example (again over simplified): If a message is encrypted using substitution (substituting one alphabet with another), permute the message (shuffle the text) and apply a substitution again, then the encrypted ciphertext is more secure than using only substitution or only permutation. NOW, if the ciphertext is embedded in an [image, video, voice, etc.] it is even more secure. If an encrypted message is intercepted, the interceptor knows the text is an encrypted message. With steganography, the interceptor may not know the object contains a message.

 


Next Section: 5. References and Resources


[Neil's Homepage] [Security and Privacy] [Steganography]

Copyright, ©1995-2000 Neil F. Johnson. All Rights Reserved.
Send comments or questions to nfj(at)jjtc(dot)com.

Internet Developers Association
Member
The author is a member of
The HTML Writers Guild

Get Microsoft Internet Explorer

  ActiveX

This document uses tables, cascading style sheets, ActiveX controls and VBScript so it is best experienced with Microsoft Internet Explorer.