1st Edition

Investigator's Guide to Steganography

By Gregory Kipper Copyright 2004
    240 Pages 74 B/W Illustrations
    by Auerbach Publications

    Investigators within the law enforcement and cyber forensics communities are generally aware of the concept of steganography, but their levels of expertise vary dramatically depending upon the incidents and cases that they have been exposed to. Now there is a book that balances the playing field in terms of awareness, and serves as a valuable reference source for the tools and techniques of steganography.

    The Investigator's Guide to Steganography provides a comprehensive look at this unique form of hidden communication from its earliest beginnings to its most modern uses. The book begins by exploring the past, providing valuable insight into how this method of communication began and evolved from ancient times to the present day. It continues with an in-depth look at the workings of digital steganography and watermarking methods, available tools on the Internet, and a review of companies who are providing cutting edge steganography and watermarking services. The third section builds on the first two by outlining and discussing real world uses of steganography from the business and entertainment to national security and terrorism. The book concludes by reviewing steganography detection methods and what can be expected in the future.

    It is an informative and entertaining resource that effectively communicates a general understanding of this complex field.

    INTRODUCTION

    A BASIC UNDERSTANDING OF STEGANOGRAPHY
    What is Steganography?
    The Differences Between Steganography and Cryptography
    The Differences Between Steganography and Watermarking
    The Prisoner's Problem
    Microdots
    One-time Pads
    Semagrams
    Null Ciphers
    Anamorphosis
    Acrostics
    Type Spacing and Offsetting
    Spread Spectrum
    Invisible Ink
    Newspaper Code
    Jargon Code
    Grille's - Cardano's Grille


    HISTORY
    The Egyptians
    The Greeks
    Aeneas the Tactician
    The Chinese
    Gaspar Schott
    Johannes Trithemius
    Giovanni Porta
    Girolamo Cardano
    Blaise de Vigenere
    Auguste Kerchoffs
    Bishop John Wilkins
    Mary Queen of Scots
    The Culpers and George Washington
    The Pigeon Post into Paris
    Civil War Rugs
    World War I
    World War II
    The USS Pueblo
    The Vietnam War
    US/USSR Nuclear Arms Treaties
    Margaret Thatcher

    STEGANOGRAPHY IN DEPTH
    Steganography Techniques
    The Six Categories of Steganography
    Types of Steganography
    Embedding Methods
    Steganography Applied to Different Media
    Attacks


    WATERMARKING
    History
    Classification of Watermarks
    Types of Watermarks
    Reasons for Invisible Watermarking
    Specific Watermarking Technologies
    Requirements of a Robust Digital Watermark
    Suitable Methods for Watermarking
    Watermarks and Compression
    Attacks
    Fingerprinting
    Summary


    STEGANOGRAPHY TOOLS
    Anahtar
    BackYard
    Blindside
    BMP Secrets
    bProtected® 2000
    BuryBury
    Camera/Shy
    Camouflage
    Cloak
    Contraband - Hell Edition
    Courier
    Crypto 123
    Dark Files
    Data Stash
    Digital Picture Envelope
    Disk Hide
    Dound
    DPT 32
    DriveCrypt
    Drive Hider
    Easy File & Folder Protector
    EasyMemo
    EmptyPic
    EncryptPic
    EzStego
    F5
    FFEncode
    File Protector
    Folder Guard™
    GhostHost
    Gif-it-up
    Gifshuffle
    GZSteg
    Hide It
    Hide4PGP
    Hide Drive
    Hide Drives
    Hide Folders
    Hide In Picture
    Hide Me
    Hide-Seek v.50
    Info Stego
    InPlainView
    InThePicture
    Invisible Files 2000 Pro
    Invisible Secrets
    JP Hide and Seek
    Jsteg Shell
    KPK File
    Magic Folders
    MASKER
    MergeStreams
    MP3 Stego
    NICETEXT
    NookMe
    OutGuess
    Palm Tree
    Paranoid
    PC FileSafe
    Phototile
    Picture Messenger
    Point Lock PRO
    PRETTY GOOD ENVELOPE
    Private Info
    Protector
    RightClickHide
    Sam's Big Playmaker
    SandMark
    Scramdisk
    Secret Space
    SecurDesk
    Snow
    Spammimmic
    StealthDisk
    Steghide
    Steganosaurus
    StegoTif
    StegoWav
    S-Tools
    SysCop
    Texto
    WbStego
    White Noise Storm
    Latest and Greatest
    Hydan


    PRODUCTS AND COMPANIES
    Alpha-Tech Ltd
    AlpVision
    BlueSpike
    Compris
    CenturionSoft
    Central Research Laboratories
    Data Dot Technologies Ltd
    DataMark Technologies
    Digimarc
    eWatermarking
    Intertrust
    Macrovision
    MarkAny
    MediaSec Technologies
    MTL Systems, Inc
    SealTronic Technology, Inc.
    Signum Technologies
    Spectra Systems Corporation
    Verance
    WetStone Technologies - Stego Watch


    REAL-WORLD USES
    Medical Records
    Workplace Communication
    DNA Microdots
    Monitoring of Radio Advertisements
    PKI and Steganography
    Digital Music
    Intellectual Property Protection Systems
    Digital Rights Management Systems
    Intertrust
    The Madison Project
    Cryptolope
    MagicGate and OpenMG
    Systems Built on Encrypted MP3 files
    MJuice
    M-Trax
    Key2Audio
    Super Audio CD and DVD Audio
    Recording Industry Association of America (RIAA)
    Secure Digital Music Initiative (SDMI)
    The MUSE Project
    Steganography and the Internet
    Terrorism and Foreign Interest
    The Movie Industry
    Steganographic File Systems

    DETECTION AND ATTACKS
    Detection
    Attacks

    THE FUTURE

    GLOSSARY

    Biography

    Gregory Kipper