Steganography Flashcards

1
Q

What is steganography?

A

The art/science of communicating by hiding secret messages in innocuous ‘cover’ objects (such as an image).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is an acrostic?

A

A text, usually a poem, in which particular letters, such as the first letters of each line, spell a word or phrase.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a cover object (C)?

A

A message that can be transmitted without suspicion.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a stego-object (S)?

A

A cover object containing an embedded secret object.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a stego-key (k)?

A

Used to encrypt the secret message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the two types of steganography and which is more secure?

A
  • Pure
  • Stego-key
  • Stego-key is more secure
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is pure steganography?

A
  • Does not require the exchange of prior information such as a stego-key
  • Both sender and receiver must have access to the embedding and extraction algorithm but the algorithm should not be public.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

When is a stego-key exchanged?

A

A secret stego-key is exchanged prior to communicating using a stego-object.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is LSB?

A

Least significant bit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a visual attack?

A

A visual attack is a means of detecting embedded information e.g. by visual inspection of the least significant bits only of a digital image.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What happens to an image where embedding takes place?

A

In general image structure is lost when embedding has taken place

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What do visual attacks work well for and what can it tell you?

A
  • Can also tell us the proportion of the image that has been used for embedding.
  • Can work well for sequential embedding
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What do visual attacks not work well for?

A

Random interval method

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What do statistical attacks refer to?

A

The term statistical attack is used when referring to non-visual methods for determining embedding.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What changes an image histogram?

A

Embedding secret information in the least significant bits of an image changes the image histogram.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is an image histogram?

A

Image histogram is the frequency distribution of grey-levels within a digital image.

17
Q

What does bit depth 4 mean?

A

Encoded with 4 binary bits

18
Q

How can you analyse an image histogram?

A

A chi-squared statistic

19
Q

What does Ei = ?

A

Ei = (h2si-1 + h2si)/2
Corresponds to every other column in the histogram
E = expected value

20
Q

What does the chi-squared statistic?

A

Oi = h2si
O = observed value

21
Q

What is secret key steganography?

A

a secret stego-key is exchanged prior to communicating using a stego-object.