Steganography can be referred as an art of invisible communication. It hides the very presence of communication without leaving any apparent evidence. In other words, steganography is a technique to hide secret information in such a way that an outsider cannot even sense the presence of the embedded message. The medium used to hide the information is called cover object. Based on the cover object, steganographic techniques can be categorized as image steganography, audio steganography, video steganography, text steganography etc… In case of image steganography, the image with hidden data is called as stego image. The figure below shows a basic image steganographic system.
Early Evidence of Steganography:
Even though the term “steganography” was coined at the end of 15th century, the history of steganography dates back to 440 BC. It was derived by combining the two Greek words, “stegano” and “grafia” which means covered/secret and writing/drawing respectively. In olden days, the different ways used for hiding secret messages were tattooing on the scalp of slaves, hiding on tablets covered with wax, writing on the stomachs of rabbits, etc. .
Tattooing on the scalp of slaves:
The earliest known evidence of steganography was quoted by Herodotus during 484-425 BC. He dictates how Histiaeus (his master), sent one of his slave to the Ionian city of Miletus with a secret information hidden on his body. Firstly, the message was tattooed on the scalp of slave or carrier after shaving his head. The slave was sent to the Ionian city of Miletus only after allowing his hair to grow. Once the messenger reached the destination, the slaves head was again shaved in order to decode the secret message. How Demeratus informed Sparta about Xerxes’s intention to invade Greece was also documented by Herodotus.
Wax coated tablets:
As another early evidence of steganography, wax coated tablets were used for writing text in ancient Greece. To preserve the messages secrecy, the wax coat was removed off the tablets and the message was engraved on the underlying wood. After writing the secret message, the tablet was again covered with wax. As there were no apparent evidence for the presence of message in the tablets, without question they easily passed inspection by sentries. The embedded message can only be decoded by scraping away all of the wax.
An another steganographic approach was proposed by the Greek writer, Aeneas Tactician. His idea was to choose women’s earrings as a media to conceal secret information. He also proposed the idea of using pigeons to deliver secret messages.
Apart from the methods mentioned, another ancient technique used to hide messages was using “invisible inks”. Usage of invisible inks to hide data dates back to first century AD. Ancient times, Romans used to hide secret message by writing between lines with the help of invisible inks. Those days the invisible inks were derived from readily available substances such as urine, milk, and fruit juices. By heating the letter, the secret message the letter could be heated, thus darkening the text and the secret message could be revealed or decoded. Another technique used to decode the message was to add little amounts of carbon black or soot on the letter that would stick to the invisible ink.
With the advance of science, as the branch of chemistry progressed new techniques were in cooperated with invisible ink method in order to hide secret data. For example, gallotanic acid made from gallnuts was used as invisible ink. The hidden can be revealed by painting copper sulfate over it. Another early chemical method used during Second World War was to write secret message using solution of copper sulfate on a handkerchief and decoding by exposing to ammonia fumes.
During the fifteenth and sixteenth centuries the steganographic techniques continued to develop and truly flowered in twentieth century.
- Difference between Steganography and Cryptography
- Image Steganography in Cryptography
- Image Steganography using OpenCV in Python
- Image based Steganography using Python
- Text extraction from image using LSB based steganography
- Deletion of a given node K in a Binary Tree using Level Order Traversal
- Count unequal element pairs from the given Array
- Find the last remaining Character in the Binary String according to the given conditions
- Partition the array into two odd length groups with minimized absolute difference between their median
- Fill the missing numbers in the array of N natural numbers such that arr[i] not equal to i
- Find Maximum and Minimum of two numbers using Absolute function
- How to Become Google Developer Students Club (DSC) Lead ?
- What is Hactoberfest and How One Can Take Participate in it?
- Introduction of Hyperledger
If you like GeeksforGeeks and would like to contribute, you can also write an article using contribute.geeksforgeeks.org or mail your article to email@example.com. See your article appearing on the GeeksforGeeks main page and help other Geeks.
Please Improve this article if you find anything incorrect by clicking on the "Improve Article" button below.