![]() jpg file or applying mathematical functions to select RGB pixel values) have been easy to detect and uncover, and hand-crafted ones are difficult and not scalable. Until recently, however, computational steganography methods for images (such as appending bits at the end of a. Bottom: Analysis of signature by art historian Henry Adams. Image licensed under Creative Commons CC BY-ND 2.0. ![]() ![]() One such example of this is Jackson Pollock’s “Mural”, wherein Pollock hid his entire name in plain sight in the curvatures of the work. Painters often hide signatures, self-portraits, and other secret messages within their works as an “inside joke”. Steganography has long been associated with painting and visual art. What’s the use of, say, Shor’s algorithm (for breaking RSA encryption in polynomial time using a quantum computer) if you don’t even know what to decrypt? A natural question: how is this different from cryptography? Isn’t cryptography a very well-studied field in which two individuals aim to share information with each other without an eavesdropper being able to discover this information? Indeed, these two areas are very similar, but there’s an interesting property of steganography that takes information sharing to a whole different level: the information is shared without an eavesdropper even knowing that anything secret is being shared. Steganography has been used for ages to communicate information in a hidden manner.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |