Steganography, Next Generation

Published: 20 December 2001 y., Thursday
But the good guys can play, too. A new steganography-based technique hides barcodes inside pictures and could help create forgery-proof identity documents. The Concealogram, developed by a scientist from the electrical- and computer-engineering department of Israel's Ben Gurion University of the Negev, slips a two-dimensional barcode inside a halftone image, which can be read by scanning the image with a regular optical scanner. The Concealogram algorithm, created by Joseph Rosen, an associate professor whose interests are image processing, optics and holography, is "hard-copy" steganography, he says. "This is not digital steganography because the secret information is not hidden inside a digital file (such as MP3s or JPEGs), but in a hard copy print, after the data leaves the computer," Rosen said. "Also, it is not chemical steganography because the secret information is neither hidden in the material of the paper nor in the ink. The secret data is encrypted within the printed visible image in a special but simple way." The 2-D barcode is a cousin to the ubiquitous striped one-dimensional barcode. Linear barcodes hold a dozen characters that provide a reference number. The 2-D barcode, made up of a binary system of dots instead of lines, has all the information stored within so there's no need to connect to a database. A halftone image, a common way of creating pictures, is also made up of a binary set of dots. This makes a perfect match, with one able to be slipped inside the other.
Šaltinis: wired.com
Copying, publishing, announcing any information from the News.lt portal without written permission of News.lt editorial office is prohibited.

Facebook Comments

New comment


Captcha

Associated articles

Hotmail Targets Web Beacons

Microsoft on Thursday announced Hotmail users could block HTML images from appearing in e-mail messages, in a move meant to foil spammers trolling for valid e-mail addresses more »

U.S. agencies defend gov't data-mining plans

Leaders of two much-criticized projects that privacy advocates fear will collect massive amounts of data on U.S. residents defended those projects before the U.S. Congress Tuesday more »

Microsoft unveils hardware partner portal

Site holds resources for hardware and driver software makers more »

search.lt news

search.lt presents newest links more »

Europe's Borderless Market: The Net

Business-to-business e-commerce is thriving more »

Poland - Lucent to expand Netia's ATM broadband network

Lucent Technologies has been executing the second phase of the ATM multiservice network for Netia, one of Poland's largest independent telecommunications service providers more »

Business Users Clearly Define Spam

The difference between spam and desired e-mail is whether the user has previously transacted business with the sender. more »

The Great IT Complexity Challenge

Technology is supposed to help simplify transactions and increase the speed of doing business, but often that is not the way it works more »

Immigration applications online

The Bureau of Citizenship and Immigration Services will start accepting immigration applications filed through the Internet on May 29 more »

search.lt news

search.lt presents newest links more »