Steganography, Next Generation

Published: 20 December 2001 y., Thursday
But the good guys can play, too. A new steganography-based technique hides barcodes inside pictures and could help create forgery-proof identity documents. The Concealogram, developed by a scientist from the electrical- and computer-engineering department of Israel's Ben Gurion University of the Negev, slips a two-dimensional barcode inside a halftone image, which can be read by scanning the image with a regular optical scanner. The Concealogram algorithm, created by Joseph Rosen, an associate professor whose interests are image processing, optics and holography, is "hard-copy" steganography, he says. "This is not digital steganography because the secret information is not hidden inside a digital file (such as MP3s or JPEGs), but in a hard copy print, after the data leaves the computer," Rosen said. "Also, it is not chemical steganography because the secret information is neither hidden in the material of the paper nor in the ink. The secret data is encrypted within the printed visible image in a special but simple way." The 2-D barcode is a cousin to the ubiquitous striped one-dimensional barcode. Linear barcodes hold a dozen characters that provide a reference number. The 2-D barcode, made up of a binary system of dots instead of lines, has all the information stored within so there's no need to connect to a database. A halftone image, a common way of creating pictures, is also made up of a binary set of dots. This makes a perfect match, with one able to be slipped inside the other.
Šaltinis: wired.com
Copying, publishing, announcing any information from the News.lt portal without written permission of News.lt editorial office is prohibited.

Facebook Comments

New comment


Captcha

Associated articles

Lindows faces a reality check

Lindows.com, the Linux operating system maker, is being forced to re-evaluate its strategy to lure the average computer user away from Windows more »

Cyberterrorism Concerns IT Pros

Threats of terrorism concern IT professionals, and almost half of those surveyed indicated that a major cyber attack on the U.S. government could be imminent more »

search.lt news

search.lt presents newest links more »

Wearable Security Locks Laptop Data

If a user wearing the system's security token walks away from his or her laptop, the system senses it and begins securing the computer by encrypting all data more »

Russia, Iraq May OK 40 Billion US Dollars Deal

Iraq and Russia are close to signing a US$40 billion economic cooperation plan, Iraq's ambassador said Saturday more »

search.lt news

search.lt presents newest links more »

Gold medalists to sue US media

Russian figure skating champions Anton Sikharulidze and Yelena Berezhnaya have voiced their intention to sue US media companies for libel more »

Microsoft finds Content Management Server holes

Microsoft has released a patch for three vulnerabilities, one of which is "critical," in its Content Management Server 2001 product for building and maintaining Web sites. more »

DOD, Army testing biometrics

The Defense Department's Biometrics Management Office (BMO) and the Army's Communications-Electronics Command (Cecom) are partnering to test the integration of fingerprint technology into the Army's tactical Network Operations Center-Vehicle more »

The CAD 3D Working Group

ParallelGraphics Joins Forces with Leading Technology Companies to Establish the CAD 3D Working Group more »