Steganography

1948

An article in the 24 June 1948 issue of Paper Trade Journal by the Technical Director of the United States Government Printing Office had Morris S.

The US granted at least two patents related to the technology, one to Kantrowitz, , "Water-Detecting paper and Water-Detecting Coating Composition Therefor," patented 18 July 1950, and an earlier one, "Moisture-Sensitive Paper and the Manufacture Thereof," , patented 20 July 1948.

1950

The US granted at least two patents related to the technology, one to Kantrowitz, , "Water-Detecting paper and Water-Detecting Coating Composition Therefor," patented 18 July 1950, and an earlier one, "Moisture-Sensitive Paper and the Manufacture Thereof," , patented 20 July 1948.

1966

Her case became somewhat famous and she became known as the Doll Woman. During World War II, photosensitive glass was declared secret, and used for transmitting information to Allied armies. Jeremiah Denton repeatedly blinked his eyes in Morse code during the 1966 televised press conference that he was forced into as an American prisoner-of-war by his North Vietnamese captors, spelling out "T-O-R-T-U-R-E".

1968

That confirmed for the first time to the US Naval Intelligence and other Americans that the North Vietnamese were torturing American prisoners-of-war. In 1968, crew members of the USS Pueblo intelligence ship, held as prisoners by North Korea, communicated in sign language during staged photo opportunities, to inform the United States that they were not defectors but captives of the North Koreans.

1985

In other photos presented to the US, crew members gave "the finger" to the unsuspecting North Koreans, in an attempt to discredit photos that showed them smiling and comfortable. === Digital messages === Modern steganography entered the world in 1985 with the advent of personal computers being applied to classical steganography problems.

1987

SE-13 of 2, in February 1987. In 1989, Wolf implemented covert channels in LAN protocols, e.g.

1989

SE-13 of 2, in February 1987. In 1989, Wolf implemented covert channels in LAN protocols, e.g.

1995

Papers and information about steganography and steganalysis research from 1995 to the present.

1997

using the reserved fields, pad fields, and undefined fields in the TCP/IP protocol. In 1997, Rowland used the IP identification field, the TCP initial sequence number and acknowledge sequence number fields in TCP/IP headers to build covert channels. In 2002, Kamran Ahsan made an excellent summary of research on network steganography. In 2005, Steven J.

2002

using the reserved fields, pad fields, and undefined fields in the TCP/IP protocol. In 1997, Rowland used the IP identification field, the TCP initial sequence number and acknowledge sequence number fields in TCP/IP headers to build covert channels. In 2002, Kamran Ahsan made an excellent summary of research on network steganography. In 2005, Steven J.

2002 paper by Niels Provos and Peter Honeyman published in Proceedings of the Network and Distributed System Security Symposium (San Diego, CA, February 6–8, 2002).

2003

This nomenclature was originally introduced by Krzysztof Szczypiorski in 2003.

2004

Raggo, DefCon 12 (1 August 2004) File Format Extension Through Steganography by Blake W.

2005

developed a data hiding technique leading to compressed forms of source video signals on a frame-by-frame basis. In 2005, Dittmann et al.

using the reserved fields, pad fields, and undefined fields in the TCP/IP protocol. In 1997, Rowland used the IP identification field, the TCP initial sequence number and acknowledge sequence number fields in TCP/IP headers to build covert channels. In 2002, Kamran Ahsan made an excellent summary of research on network steganography. In 2005, Steven J.

2006

Theory and practice with Mathcad (Rus) 2006 paper by Konakhovich G.

2012

Their findings were published in IEEE Transactions on Information Forensics and Security. === Cyber-physical systems/Internet of Things === Academic work since 2012 demonstrated the feasibility of steganography for cyber-physical systems (CPS)/the Internet of Things (IoT).

For example, by cryptographer William Easttom (Chuck Easttom). ===Online challenge=== The puzzles that are presented by Cicada 3301 incorporate steganography with cryptography and other solving techniques since 2012.

2015

A practical example of WLAN Steganography is the HICCUPS system (Hidden Communication System for Corrupted Networks) ==== Terminology and Taxonomy ==== In 2015, a taxonomy of 109 network hiding methods was presented by Steffen Wendzel, Sebastian Zander et al.

2017

The term Stegware was first introduced in 2017 to describe any malicious operation involving steganography as a vehicle to conceal an attack.




All text is taken from Wikipedia. Text is available under the Creative Commons Attribution-ShareAlike License .

Page generated on 2021-08-05