Just before creating a procedure to retrieve the inserted message documents within the 4 graphics I want to determine the several levels where the communication can be invisible. Stenography is the umbrella for many different types of methods to hide messages. The 1st level contains two areas: technical stenography and linguistic stenography. The second level consists of two areas under the proceeding of linguistic stenography: semagrams and wide open codes. Specialized stenography is without sublevels. Another level contains four sublevels two underneath the heading of semagrams (visual and text) and two under the heading of open codes (jargon and protected ciphers). The fourth level contains two ciphers that are discovered under the subheading of covered ciphers: null and grille. Now that the various levels had been identified it can time to determine how the information is definitely hidden applying these stenographic components (Kessler 2004). Technical stenography is founded on the clinical methods of covering messages with invisible tattoo or microdots. The smaller the knowledge can be made the harder it will be to find and the easier it is to hide. Linguistic stenography hides emails in the company waves and it is broken into two extra areas semagrams and open codes. Symbols/signs are the step to using semagrams. Objects we see every day are used so to convey a concealed message. It could be something as easy as the arrangement over a picture of your dinner table. Textual content semagram hides messages throughout the modification of carrier textual content. Once again the alterations are very subtle and if you don't know what to watch out for them you are going to miss that. These advancements can be font size and font type (Kessler 2004). Authentic jar messages may be embedded with open rules that would not be conveniently detected by average person. Through this area you will discover sections generally known as jargon and covered ciphers. We all know what pig Latin is however, not everyone knows the right way to speak this. This is the...
Sources: Kessler, Whilst gary C. (2004 February). An Overview of Steganography for the pc Forensics Examiner. Retrieved Drive 30, 2011, from
Provos, Niels. (2004 Sept 5). Steganography Detection with Stegdetect. Recovered March 40, 2011, by http://www.outguess.org/detection.php
Snapfiles. com. (2007). Password Restoration. Retrieved 03 30, 2011, from http://www.snapfiles.com/freeware/security/fwpasswordrecovery.html