Publication:
Herramienta para la detección de contenido oculto en redes P2P

Loading...
Thumbnail Image
Identifiers
Publication date
2012-09
Defense date
2012-09-26
Tutors
Journal Title
Journal ISSN
Volume Title
Publisher
Impact
Google Scholar
Export
Research Projects
Organizational Units
Journal Issue
Abstract
This end of degree project is based on two key parts, steganography and P2P networks. The term steganography comes from the Greek words steganos, which means hidden, and graphos, which means writing. Therefore, the term, literally, can be interpreted as hidden writing. From a more general point of view the term steganography can be interpreted as the study of the set of techniques and processes that enable to hide information embedding it in other information. Informally, steganography supplies the necessary tools to hide messages inside other messages (which only are supposed to be visible for the message's recipient). Although it may seem as a recent technique, steganography is a discipline used long since. Throughout history there have been many documented ways of exchanging messages hiding its existence, here are just a few: • Approximately toward the year 440 B.C, Aristágoras of Mileto (tyrant of Mileto's city), used one of his slaves to provoke a riot against the Persian. The way to exchange the message was the following: first, Aristagoras shaved the head of one of his slaves and tattooed him the message that wanted to send in the slave's scalp. Done that, he just needed to wait for the slave's hair to grow back. When this happened, he sent the slave to meet the receiver of the message. Shaving the slave´s head he was able to access it. • During Middle Age in Europe a method consisting in superimposing a template (which used to be paper or wood), called Cardan grille and which contained a series of holes on a write was developed. • During World War II some rather curious methods were developed to hide messages. One of them was to use the characters "j", "i", "t" and "f" to send messages in Morse code within a message, written on a microfilm, which was apparently normal. As can be observed the characters "j" and "i" could be used to transmit the "short beeps" message, while the characters "f" and "t" could be used to transmit the "long beep" message. • Another method that was developed during the World War II was possible thanks to the technological advances in photography. Thanks to these advances, the micropoints technology was developed. This technology allows reducing a photograph to a point size so that adding these images in a text is possible. If these images are hidden as punctuation marks (points, commas ...), they are almost undetectable. • Finally, among the most widely used methods throughout history are invisible inks. Text messages can be written with these inks. To have access to these messages is necessary to heat the paper support on which the message is written. The most common inks used can be: lemon juice, milk, urine, ammonia salt... in general, substances containing large amounts of carbon in its composition.
Description
Keywords
Redes de ordenadores, Arquitectura de redes, Esteganografía, Redes P2P
Bibliographic citation