Cryptography and Steganography: teaching experience

  • Bartosz Sokół
  • V. N. Yarmolik


In this article we present overview of work with cryptography and steganography techniques, which refers to information hiding and providing secrecy. Article contains cryptography and steganography teaching results and experiences. First chapter contains information about steganography and its history. Next chapter provides information about hiding methods. We present there the most known, simple, computer-based steganographic techniques which our students mastered during studies. Third chapter includes information about few laboratory projects and results to the cryptography and steganography point. This chapter makes a review of several interesting steganography and cryptography approaches, which were implemented and become a subject of meticulous studies aimed at the development of new software.

Key words

Steganography information hiding cryptography watermarking 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

5. References

  1. [1]
    N.F. Johnson, Z. Duric, S. Jajodia: Information Hiding Steganography and Watermarking — Attacks and Countermeasures; Kluwer Academic Publishers, 2001.Google Scholar
  2. [2]
    S. Katzenbeisser, F.A.P. Petitcolas: Information Hiding — techniques for steganography and digital watermarking; Artech House, 2000Google Scholar
  3. [3]
    S. Singh: The code book. The science of secrecy from ancient Egypt to quantum cryptography. Swiat Ksiazki, 2003, pp. 19–21, 45.Google Scholar
  4. [4]
    D. Kahn: The Codebreakers. 2nd edition; Macmillan, 1996.Google Scholar
  5. [5]
    B. Norman: Secret Warfare; Acropolis Books, 1973.Google Scholar
  6. [6]
    Herodotus: The Histories, London, England: J.M. Dent & Sons, Ltd, 1992.Google Scholar
  7. [7]
    V.N. Yarmolik, Proceedings of CISIM 2003, Obfuscation, watermarking and tamper-proofing: modern approaches for software ownership protection.Google Scholar
  8. [8]
    C. Bancroft: Genomic Steganography: Amplifiable Microdots. Talk provided at Biomomolecular Computation Workshop: Its Potential and Applications, National Science Foundation, Arlington, Virginia, 1999.Google Scholar
  9. [9]
    C.T. Clelland, V. Risca, C. Bancroft: Hiding Messages in DNA Microdots. Nature, 399(6736):533–534,1999.CrossRefGoogle Scholar
  10. [10]
    A. Gehani, T.H. LaBean, J.H. Reif: DNA-based Cryptography, in [11], 2000Google Scholar
  11. [11]
    E. Winfree, D.K. Gifford (eds.): DNA Based Computers V, Massachusetts Institute of Technology, June 1999, DIMACS Series in Discrete Mathematics and Theoretical Computer Science, vol. 54, American Mathematical Society, 2000.Google Scholar
  12. [12]
    E.H. Wilkins: A History of Italian Literature, London: Geoffrey Cumberlege, Oxford University Press, 1954, pp. 105–106.Google Scholar
  13. [13]
    A. Kerckhoffs: La Cryptographie Militaire, Journal des Sciences Militaires, vol. 9, Jan. 1883, pp. 5–38.Google Scholar
  14. [14]
    M. Roe: Cryptography and Evidence, Ph.D. thesis, University of Cambridge, Clare College, 1997.Google Scholar
  15. [15]
    R.J. Anderson, R.M. Needham, A. Shamir: The Steganographic File System, in Proceedings of the Second International Workshop on Information Hiding, vol. 1525 of Lecture Notes in Computer Science, Springer, 1998, pp. 73–82.Google Scholar
  16. [16]
    T.G. Handel, M.T. Stanford: III. Hiding Data in the OSI Network Model, in. Proceedings of the First International Workshop on Information Hiding, vol. 1174 of Lecture Notes in Computer Science, Springer-Verlag, 1996, pp. 23–38.Google Scholar
  17. [17]
    J. Lach, W.H. Mangione-Smith, M. Potkonjak: Enhanced Intellectual Property Protection for Digital Circuits on Programable Hardware, in. Proceedings of the Third International Workshop on Information Hiding, vol. 1768 of Lecture Notes in Computer Science, Springer-Verlag, 1999.Google Scholar
  18. [18]
    J. Brassil, L. O’Gorman, N.F. Maxembchuk, S.H. Low: Document Marking and Identification using Both Line and Word Shifting, Infocom, Boston, 1995, pp. 853–860.Google Scholar
  19. [19]
    P. Wayner: Disappearing Cryptography. Chestnut Hill, MA: Ap Professional, 1996.Google Scholar
  20. [20]
    C.H. Rowland: Convert Channels in the TCP/IP Protocol Suite, 1996.Google Scholar
  21. [21]
    R. Machado: “EzStego, Stego Online. Stego”, 1997.Google Scholar
  22. [22]
    A. Brown: “S-Tools for Windows”, 1996.Google Scholar
  23. [23]
    “StegoDos-Black Wolf’s Picture Encoder v0.90B,” 1993.Google Scholar
  24. [24]
    H. Hastur: “Mandelsteg”, 1994.Google Scholar
  25. [25]
    R. Arachelian: “White Noise Storm”, 1994.Google Scholar

Copyright information

© Springer Science+Business Media, Inc. 2005

Authors and Affiliations

  • Bartosz Sokół
    • 1
  • V. N. Yarmolik
    • 1
  1. 1.Bialystok University of TechnologyBialystokPoland

Personalised recommendations