The term steganography comes from the Greek meaning Steganos incognito or penyembuyian and graphein which means it is written. In the year 400 BC in Greece, known as the term wax tablet. Messages written on the media timber and then concealed with candles lining the lid. When World War II, to write the hidden documents, messages written in invisible ink, to see what is written, the document must be heated for invisible ink is a dark and hidden messages that can be read.
In modern steganography, with advances in digital computer technology, the focus tends towards steganography to hide messages in digital media, digital image formats such as BMP, GIF, sound and digital music, even with a particular steganography algorithms, not only digital media, but the HTML file can also inserted message by changing its sequence tag. This is called steganography Steganography with digital.
Some examples of media used in Digital Steganography:
· Digital Image
Digital image is a digital media most often interchangeable, relatively small size is the right choice to hide a short message
· Well Formed Text
HTML and XML documents is a document that has a way of formatting using tags. The sequence of tags and attributes those tags can be rearranged in order to hide a secret message
· Audio
An audio file, typically have a long duration, by manipulating the timing and frequency of sound using a specific steganography algorithm, messages can be inserted without making any suspicious people who listen to audio files.
· Video
Video has its own algorithm (codec) to reduce video file size without sacrificing image quality. Steganography can utilize the algorithm to insert a secret message into a video.
Assessment of a good steganographic algorithm can be assessed from several factors:
· Imperceptible
The existence of the message in the media reservoir can not be detected.
· Fidelity
Digital media inserted message did not experience any changes in terms of
quality.
· Recovery
Secret messages that have been inserted in container media must be disclosed again. This is an absolute requirement of a steganographic algorithm.
Benefits Steganography
Steganography is a double-edged knife, it can be used for good reasons, but it can also be used as a means of crime. Steganography can also be used as one method of watermarking on images for copyright protection, as well as digital watermarking (fingerprinting). Steganography can also be used instead of hash. And especially, as mentioned previously, steganography can be used to hide secret information, to protect it from theft and from people who are not entitled to know. Unfortunately, steganography can also be used to steal data that is hidden in other data that can be sent to other parties, which do not have the right, without being suspicious. Steganography can also be used by terrorists to communicate with each other.
In relation to information systems security, steganography is only one of many ways that can be done to hide a secret message. Steganography is more suitable for use in conjunction with other methods to create a layered security. As an example of steganography can be used in conjunction with encryption. Windows and Unix also use steganography in implementing the hidden directory.
Steganography Examples Manual:
In writing this steganography, the story writer is a blogger who will try to send a secret message to the recipient. The media used the author as an introduction to the secret message is an advertisement in the print media ie newspaper. Thus the first thing will be done by the authors is to make ads as natural as possible so it will not look suspicious if one is reading it. Ads are embodied in Figure 1 below, which cuts slots ads on food and beverages (dummy):
When we look at the pieces of the ad slot on the print media newspapers above, we can see that piece of the ad slot consists of 2 pieces and 2 pieces of text ads image ads. Steganographic messages can be found on each of these ads, whether in the form of text ads or image ads. Ads that contain steganographic messages can be seen in figure 2 below:
Where is the secret message?. Such messages are on the right side of image ads on top, and how to read is as follows:
"Read the next letter in each sentence, including the point"
In modern steganography, with advances in digital computer technology, the focus tends towards steganography to hide messages in digital media, digital image formats such as BMP, GIF, sound and digital music, even with a particular steganography algorithms, not only digital media, but the HTML file can also inserted message by changing its sequence tag. This is called steganography Steganography with digital.
Some examples of media used in Digital Steganography:
· Digital Image
Digital image is a digital media most often interchangeable, relatively small size is the right choice to hide a short message
· Well Formed Text
HTML and XML documents is a document that has a way of formatting using tags. The sequence of tags and attributes those tags can be rearranged in order to hide a secret message
· Audio
An audio file, typically have a long duration, by manipulating the timing and frequency of sound using a specific steganography algorithm, messages can be inserted without making any suspicious people who listen to audio files.
· Video
Video has its own algorithm (codec) to reduce video file size without sacrificing image quality. Steganography can utilize the algorithm to insert a secret message into a video.
Assessment of a good steganographic algorithm can be assessed from several factors:
· Imperceptible
The existence of the message in the media reservoir can not be detected.
· Fidelity
Digital media inserted message did not experience any changes in terms of
quality.
· Recovery
Secret messages that have been inserted in container media must be disclosed again. This is an absolute requirement of a steganographic algorithm.
Benefits Steganography
Steganography is a double-edged knife, it can be used for good reasons, but it can also be used as a means of crime. Steganography can also be used as one method of watermarking on images for copyright protection, as well as digital watermarking (fingerprinting). Steganography can also be used instead of hash. And especially, as mentioned previously, steganography can be used to hide secret information, to protect it from theft and from people who are not entitled to know. Unfortunately, steganography can also be used to steal data that is hidden in other data that can be sent to other parties, which do not have the right, without being suspicious. Steganography can also be used by terrorists to communicate with each other.
In relation to information systems security, steganography is only one of many ways that can be done to hide a secret message. Steganography is more suitable for use in conjunction with other methods to create a layered security. As an example of steganography can be used in conjunction with encryption. Windows and Unix also use steganography in implementing the hidden directory.
Steganography Examples Manual:
In writing this steganography, the story writer is a blogger who will try to send a secret message to the recipient. The media used the author as an introduction to the secret message is an advertisement in the print media ie newspaper. Thus the first thing will be done by the authors is to make ads as natural as possible so it will not look suspicious if one is reading it. Ads are embodied in Figure 1 below, which cuts slots ads on food and beverages (dummy):
When we look at the pieces of the ad slot on the print media newspapers above, we can see that piece of the ad slot consists of 2 pieces and 2 pieces of text ads image ads. Steganographic messages can be found on each of these ads, whether in the form of text ads or image ads. Ads that contain steganographic messages can be seen in figure 2 below:
Where is the secret message?. Such messages are on the right side of image ads on top, and how to read is as follows:
"Read the next letter in each sentence, including the point"
**sopan santun dalam tutur kata ialah pibadi yang baik**