Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
Пособие ФИБ 2010 3 курс.doc
Скачиваний:
5
Добавлен:
03.11.2018
Размер:
1.19 Mб
Скачать

6. Answer the questions

What is the purpose of steganography?

How is steganography related to cryptography?

What was the early use of cryptography?

What is carrier? Steganography medium?

What is the application of steganography nowadays?

7. Mark the following statements true or false. Correct the false statements.

1. Steganography is the art of hiding the existence of secret communication.

  1. Steganography got its name several millennia back.

  2. Carrier is a special medium where the secret message is put.

  3. Jargon codes use special phrases with the meaning that is not understood by malicious users.

  4. Technical steganography changes the way the carrier text looks by adding extra spaces or using different flourishes.

Vocabulary tasks

8. Give as many word combinations as possible and translate them

Steganography

Cipher

9. Make the word combinations

  1. digital

a) communication

  1. size-reduction

b) code

  1. covert

c) application

  1. open

d) fraud

  1. nefarious

e) text

  1. nonobvious

f) watermarking

  1. cue

g) a message

  1. convey

h) method

  1. carrier

i) code

  1. financial

j) way

10. Complete the text using the terms and word combinations given below.

Apparent message, covered, illegal, a transport layer, the visible lines, suspicion.

The word "Steganography" is of Greek origin and means " … or hidden writing". Its ancient origins can be traced back to 440 BC. Generally, a steganographic message will appear to be something else: a picture, an article, a shopping list, or some other message. This … is the covertext. For instance, a message may be hidden by using invisible ink between … of innocuous documents.

The advantage of steganography over cryptography alone is that messages do not attract attention to themselves, to messengers, or to recipients. An unhidden coded message, no matter how unbreakable it is, will arouse … and may in itself be incriminating, as in countries where encryption is ….

Steganography used in electronic communication include steganographic coding inside of …, such as an MP3 file, or a protocol, such as UDP.