ࡱ> c -jbjb(p(p eBB'1N8<J,N1llll 1111111,4R6F1{F1ll[1ll1D",1. 1v L/ 1 q101/\770 1NNd$NNResources: Examples of Steganography Null Cipher Taking the first letter of each word in the cover message forms the hidden message from this World War I communication. PRESIDENT'S EMBARGO RULING SHOULD HAVE IMMEDIATE NOTICE. GRAVE SITUATION AFFECTING INTERNATIONAL LAW. STATEMENT FORESHADOWS RUIN OF MANY NEUTRALS. YELLOW JOURNALS UNIFYING NATIONAL EXCITEMENT IMMENSELY. The first letter from each word yields: PERSHINGSAILSFROMNYJUNEI Adding the appropriate spacing yields the message PERSHING SAILS FROM NY JUNE I Change In Font Changes in font indicate importance of letters or words. Hey Cody, Want to go to the mall this weekend? My mom has someone she has to meet about selling our car. She asked me if I wanted to go. No way! My mom will give me money for pizza after the mall. I hate school pizza. Your friend, Taysia In this example, the key words are in a different font. Where the body of the message is in Courier, the words of the message are in Courier New. The two fonts are similar, yet different enough. The words in the different font spell out the message of meet me after school. In a similar manner, deliberate misspellings and the use of spacings can be used to indicate significant words. Another low-tech steganographic technique involves creating a paper template to overlay on text. For this, anything from a page from a newspaper, book or even a hand written letter can be used as source material. Overlay a thin piece of paper over the source material. You can then use a pin to select the characters you need to create your message. This overlay is then delivered to your recipient who will use it over the source material to receive the message. Resources: Books Johnson, N., Duric, Z., & Jajodia, S. (2001). Information hiding: Steganography and watermarking attacks and countermeasures. Boston, MA: Kluwer Aacademic Publishers. This volume is divided into four sections: 1. Introduction to steganography through a historical perspective and examples of techniques; 2. Image based steganography and watermarking; 3. Detecting steganographic techniques through steganalysis; and 4. Examing attacks against digital watermarking. The book is thorough in its explanation of how various steganographic techniques are accomplished. Kipper, G. (2004). Investigators guide to steganography. Boca Raton, LA: Auerbach Publications. This book is an excellent reference on steganography. It includes explaining what steganography is, provides examples of steganography throughout history, and how it is used today. This book also provides an excellent resource on different steganographic techniques and how they work. There are also sections on existing programs for steganography and real world uses. A thorough glossary is included in the book. Web Resources An Overview of Steganography for the Computer Forensics Examiner, Gary C. Kessler  HYPERLINK "http://www.garykessler.net/library/fsc_stego.html" http://www.garykessler.net/library/fsc_stego.html Thorough and well done paper on steganography has examples, explanation of processes, and a section on detecting steganography. This reading is a must for understanding steganography. Digital Watermarking Alliance  HYPERLINK "http://www.digitalwatermarkingalliance.org/faqs.asp" http://www.digitalwatermarkingalliance.org/faqs.asp The Digital Watermarking Alliance is an international group of industry leading organizations that was formed in 2006 to promote the value of digital watermarking to content owners, industry, policy makers and consumers. Geek to Live: Hide Data in Files with Easy Steganography Tools, Gina Trapani  HYPERLINK "http://lifehacker.com/230915/geek-to-live--hide-data-in-files-with-easy-steganography-tools" http://lifehacker.com/230915/geek-to-live--hide-data-in-files-with-easy-steganography-tools Article is a concise, easy to follow overview on how steganography works on both Windows and Mac platforms.  HYPERLINK "http://ginatrapani.org/" Gina Trapani, the editor of Lifehacker, fancies herself a super-secret spy. Her semi-weekly feature,  HYPERLINK "http://lifehacker.com/software/geek-to-live/" Geek to Live, appears every Wednesday and Friday on Lifehacker.com  HYPERLINK "http://linuxpoison.blogspot.com/2011/10/how-to-hide-data-steganography-into-mp3.html" How to Hide data (Steganography) into MP3 file - mp3stego, Posted by Nikesh Jauhari  HYPERLINK "http://linuxpoison.blogspot.com/2011/10/how-to-hide-data-steganography-into-mp3.html" http://linuxpoison.blogspot.com/2011/10/how-to-hide-data-steganography-into-mp3.html#ixzz21BF6zU6E MP3Stego is a popular application for steganography. This simple and short how-to will walk you through using MP3Stego. How to Hide Secret Documents, Videos & Audio Messages inside JPG Images,  HYPERLINK "http://labnol.blogspot.in/about/" Amit Agarwal  HYPERLINK "http://labnol.blogspot.in/2006/10/how-to-hide-secret-documents-or.html" http://labnol.blogspot.in/2006/10/how-to-hide-secret-documents-or.html No secret tricks or programs needed to  HYPERLINK "http://www.labnol.org/software/hide-data-files/21171/" hide a file inside a JPEG image. You can place video clips, pdf, mp3, Office documents, zipped files, webpage or any other file format inside a JPEG image following these directions. Information Hiding: Steganography & Digital Watermarking, Neil F. Johnson, Ph.D. http://www.jjtc.com/Steganography/ Excellent, must have resource for those interested in learning more about steganography and digital watermarking topics. Dr. Johnson has been researching topics related to information hiding and steganography since 1995. Invisible Inks: Write & Reveal SecretMessages,  HYPERLINK "http://chemistry.about.com/bio/Anne-Marie-Helmenstine-Ph-D-7815.htm" Anne Marie Helmenstine, Ph.D.  HYPERLINK "http://chemistry.about.com/od/chemistryhowtoguide/a/invisibleinks.htm" http://chemistry.about.com/od/chemistryhowtoguide/a/invisibleinks.htm Want to combine steganography with basic principles of chemistry? This site is an excellent resource for creating invisible ink from materials found in every home. Students will enjoy being actively engaged in learning about steganography. Keyboards and Frequencies, Eberhard Sengpiel  HYPERLINK "http://www.sengpielaudio.com/calculator-notenames.htm" http://www.sengpielaudio.com/calculator-notenames.htm Great resource for understanding the naming of musical notes and frequencies. It includes the English and American scientific pitch notation system and the German system. The site also includes MIDI notes and their corresponding frequencies. Mathematical formulas for calculating MIDI note number given frequency and other conversions are presented as well. Philip Zimmermann,  HYPERLINK "http://www.philzimmermann.com/index.html" Phil Zimmermann & Associates LLC http://www.philzimmermann.com/EN/background/index.html Philip R. Zimmermann is the creator of Pretty Good Privacy, an email encryption software package. His interest in the political side of cryptography grew out of his  HYPERLINK "http://www.philzimmermann.com/EN/background/peace.html" background in military policy issues. Steganography, Neil F. Johnson.  HYPERLINK "http://www.jjtc.com/pub/tr_95_11_nfj/index.html" Steganography. Technical Report. November 1995.  HYPERLINK "http://www.jjtc.com/pub/tr_95_11_nfj/index.html" http://www.jjtc.com/pub/tr_95_11_nfj/index.html Excellent, very thorough technical report originally placed on the web in 1996. An update was published in  HYPERLINK "http://www.jjtc.com/pub/r2026a.htm" IEEE Computer in 1998. This resource should be on the top of your list. Steganography: Hiding Data Within Data, Gary Kessler  HYPERLINK "http://www.garykessler.net/library/steganography.html" http://www.garykessler.net/library/steganography.html A study of steganography is incomplete without exploring the works of Gary Kessler. This paper explains what steganography is, provides examples, and explains the process of least significant bit insertion when used in steganography.  HYPERLINK "http://technofriends.in/2009/07/13/steganography-how-to-hide-data-in-images-and-audio-files/" [Steganography] How To Hide Data In Images and Audio Files, Vaibhav  HYPERLINK "http://technofriends.in/2009/07/13/steganography-how-to-hide-data-in-images-and-audio-files/" http://technofriends.in/2009/07/13/steganography-how-to-hide-data-in-images-and-audio-files/ Steghide is a popular application for steganography. This simple and short how-to will walk you through using Steghide. Steganography Revealed, Kristy Westphal  HYPERLINK "http://www.symantec.com/connect/articles/steganography-revealed" http://www.symantec.com/connect/articles/steganography-revealed Brief and informative article covers the basics of steganography including what it is, how it works, and what tools you need to hide data. [ HYPERLINK "http://technofriends.in/2009/07/13/steganography-how-to-hide-data-in-images-and-audio-files/" Steganography] How To Hide Data In Images and Audio Files, Vaibhav  HYPERLINK "http://technofriends.in/2009/07/13/steganography-how-to-hide-data-in-images-and-audio-files/" http://technofriends.in/2009/07/13/steganography-how-to-hide-data-in-images-and-audio-files/ Short how to on using Steghide to hide data in image and audio files. Steghide is available for Windows and Linux.  HYPERLINK "http://tech2copycat.wordpress.com/" Tech2copycat, Srikanth Ramesh  HYPERLINK "http://tech2copycat.wordpress.com/2012/02/06/how-to-hide-data-in-image-audio-video-files-steganography/#more-30" http://tech2copycat.wordpress.com/2012/02/06/how-to-hide-data-in-image-audio-video-files-steganography/#more-30 Short how to on using StegoMagic to hide data in image, video, and audio files. The comp.security.pgp FAQ, Wouter Slegers  HYPERLINK "http://www.pgp.net/pgpnet/pgp-faq/" http://www.pgp.net/pgpnet/pgp-faq/ Everything you want to know about Pretty Good Privacy (PGP) and how to implement it in your communications. 2012 Board of Regents University of Nebraska &1 Y  % + G I s 9 +Z[ȻȻȻȻ⊘}jhrMhM0JUjhrMhMUjhrMhMUhrMhMOJPJQJhrMhMB*phhrMhMOJPJQJhrMhMOJPJQJhrMhMOJPJQJ hrMhMhrMhM>*hrMhMCJ$OJPJQJ,%&3z{ WYc3 @ G H I    $ a$gdM-- d HYZ!O`  BNOPNʻߠߑ}j}T}*jhrMhM0JB*OJQJUph$jhrMhMB*Uph&jhrMhMB*OJQJUphhrMhMB*OJQJphjhrMhMUhrMhMOJPJQJhrMhMKH$OJPJQJhrMhM>*jhrMhM0JU hrMhMjhrMhMUjhrMhMUNOP\]56RS tuv4ʴʭyk]j,hrMhMUjyhrMhMUj^hrMhMUjhrMhM0JUjChrMhMUjhrMhMU hrMhM*jhrMhM0JB*OJQJUphhrMhMB*OJQJph&jhrMhMB*OJQJUph$jxhrMhMB*Uph$RAdBCDuvw"  456UVtu;<= ! !!"""9":"e"f""߶ߨߌ~pj hrMhMUj hrMhMUhrMhMCJOJPJQJhrMhM0JB*phj hrMhMUj hrMhMUj hrMhMUjhrMhM0JU hrMhMjhrMhMUj+hrMhMU, 0!D"E""G#.$/$e$$%%%&N'''''())))*++`"""""""###E#F#p########-$/$e$f$$$$$$%%<&=&>&x&y&&&&ʼʯʡѯʊ|oajhrMhMUhrMhM0JB*phjhrMhMUhrMhMKH$hrMhM>*OJPJQJjhrMhMUhrMhMOJPJQJjNhrMhMU hrMhMjhrMhM0JUhrMhM>*jhrMhMUj} hrMhMU&&&&L'M'''?(@(A((())|)})~)))))-*.*/***++7+8+9+E+F+X+Y++++G,H,,,,,,ߩߛߍqj\hrMhMUjhrMhMUjPhrMhMUj%hrMhMUjhrMhMUhrMhM0JB*phj hrMhMUjhrMhM0JU hrMhMjhrMhMUjhrMhMU,++X+I,,,,, --------]gdM`,--------hM hRhM hrMhMCJmHnHsHtHjhrMhM0JU hrMhM":pM/ =!"#$%z ,, g(HH(dh com.apple.print.PageFormat.FormattingPrinter com.apple.print.ticket.creator com.apple.jobticket com.apple.print.ticket.itemArray com.apple.print.PageFormat.FormattingPrinter EPSON_Stylus_CX8400 com.apple.print.ticket.stateFlag 0 com.apple.print.PageFormat.PMHorizontalRes com.apple.print.ticket.creator com.apple.jobticket com.apple.print.ticket.itemArray com.apple.print.PageFormat.PMHorizontalRes 300 com.apple.print.ticket.stateFlag 0 com.apple.print.PageFormat.PMOrientation com.apple.print.ticket.creator com.apple.jobticket com.apple.print.ticket.itemArray com.apple.print.PageFormat.PMOrientation 1 com.apple.print.ticket.stateFlag 0 com.apple.print.PageFormat.PMScaling com.apple.print.ticket.creator com.apple.jobticket com.apple.print.ticket.itemArray com.apple.print.PageFormat.PMScaling 1 com.apple.print.ticket.stateFlag 0 com.apple.print.PageFormat.PMVerticalRes com.apple.print.ticket.creator com.apple.jobticket com.apple.print.ticket.itemArray com.apple.print.PageFormat.PMVerticalRes 300 com.apple.print.ticket.stateFlag 0 com.apple.print.PageFormat.PMVerticalScaling com.apple.print.ticket.creator com.apple.jobticket com.apple.print.ticket.itemArray com.apple.print.PageFormat.PMVerticalScaling 1 com.apple.print.ticket.stateFlag 0 com.apple.print.subTicket.paper_info_ticket PMPPDPaperCodeName com.apple.print.ticket.creator com.apple.jobticket com.apple.print.ticket.itemArray PMPPDPaperCodeName Letter com.apple.print.ticket.stateFlag 0 PMPPDTranslationStringPaperName com.apple.print.ticket.creator com.apple.jobticket com.apple.print.ticket.itemArray PMPPDTranslationStringPaperName US Letter com.apple.print.ticket.stateFlag 0 PMTiogaPaperName com.apple.print.ticket.creator com.apple.jobticket com.apple.print.ticket.itemArray PMTiogaPaperName na-letter com.apple.print.ticket.stateFlag 0 com.apple.print.PageFormat.PMAdjustedPageRect com.apple.print.ticket.creator com.apple.jobticket com.apple.print.ticket.itemArray com.apple.print.PageFormat.PMAdjustedPageRect 0 0 3225.0000000000005 2475 com.apple.print.ticket.stateFlag 0 com.apple.print.PageFormat.PMAdjustedPaperRect com.apple.print.ticket.creator com.apple.jobticket com.apple.print.ticket.itemArray com.apple.print.PageFormat.PMAdjustedPaperRect -37.5 -37.5 3262.5000000000005 2512.5 com.apple.print.ticket.stateFlag 0 com.apple.print.PaperInfo.PMCustomPaper com.apple.print.ticket.creator com.apple.jobticket com.apple.print.ticket.itemArray com.apple.print.PaperInfo.PMCustomPaper com.apple.print.ticket.stateFlag 0 com.apple.print.PaperInfo.PMPaperName com.apple.print.ticket.creator com.apple.jobticket com.apple.print.ticket.itemArray com.apple.print.PaperInfo.PMPaperName na-letter com.apple.print.ticket.stateFlag 0 com.apple.print.PaperInfo.PMUnadjustedPageRect com.apple.print.ticket.creator com.apple.jobticket com.apple.print.ticket.itemArray com.apple.print.PaperInfo.PMUnadjustedPageRect 0 0 774 594 com.apple.print.ticket.stateFlag 0 com.apple.print.PaperInfo.PMUnadjustedPaperRect com.apple.print.ticket.creator com.apple.jobticket com.apple.print.ticket.itemArray com.apple.print.PaperInfo.PMUnadjustedPaperRect -9 -9 783 603 com.apple.print.ticket.stateFlag 0 com.apple.print.PaperInfo.ppd.PMPaperName com.apple.print.ticket.creator com.apple.jobticket com.apple.print.ticket.itemArray com.apple.print.PaperInfo.ppd.PMPaperName Letter com.apple.print.ticket.stateFlag 0 com.apple.print.ticket.APIVersion 00.20 com.apple.print.ticket.type com.apple.print.PaperInfoTicket com.apple.print.ticket.APIVersion 00.20 com.apple.print.ticket.type com.apple.print.PageFormatTicket DyK yK dhttp://www.garykessler.net/library/fsc_stego.htmlDyK yK hhttp://www.digitalwatermarkingalliance.org/faqs.asp)DyK yK http://lifehacker.com/230915/geek-to-live--hide-data-in-files-with-easy-steganography-toolsDyK yK 0http://ginatrapani.org/DyK yK Zhttp://lifehacker.com/software/geek-to-live/DyK yK http://linuxpoison.blogspot.com/2011/10/how-to-hide-data-steganography-into-mp3.htmlDyK yK http://linuxpoison.blogspot.com/2011/10/how-to-hide-data-steganography-into-mp3.htmlDyK yK Bhttp://labnol.blogspot.in/about/DyK yK http://labnol.blogspot.in/2006/10/how-to-hide-secret-documents-or.htmlDyK yK lhttp://www.labnol.org/software/hide-data-files/21171/DyK yK http://chemistry.about.com/bio/Anne-Marie-Helmenstine-Ph-D-7815.htmDyK yK http://chemistry.about.com/od/chemistryhowtoguide/a/invisibleinks.htmDyK yK lhttp://www.sengpielaudio.com/calculator-notenames.htmDyK yK Rhttp://www.philzimmermann.com/index.htmlDyK yK nhttp://www.philzimmermann.com/EN/background/peace.htmlDyK yK `http://www.jjtc.com/pub/tr_95_11_nfj/index.htmlDyK yK `http://www.jjtc.com/pub/tr_95_11_nfj/index.htmlDyK yK Fhttp://www.jjtc.com/pub/r2026a.htmDyK yK lhttp://www.garykessler.net/library/steganography.html+DyK yK http://technofriends.in/2009/07/13/steganography-how-to-hide-data-in-images-and-audio-files/+DyK yK http://technofriends.in/2009/07/13/steganography-how-to-hide-data-in-images-and-audio-files/DyK yK http://www.symantec.com/connect/articles/steganography-revealed+DyK yK http://technofriends.in/2009/07/13/steganography-how-to-hide-data-in-images-and-audio-files/+DyK yK http://technofriends.in/2009/07/13/steganography-how-to-hide-data-in-images-and-audio-files/DyK yK Fhttp://tech2copycat.wordpress.com/UDyK  yK http://tech2copycat.wordpress.com/2012/02/06/how-to-hide-data-in-image-audio-video-files-steganography/more-30DyK yK Fhttp://www.pgp.net/pgpnet/pgp-faq/<@< NormalCJaJmH sH tH DA@D Default Paragraph FontRiR  Table Normal4 l4a (k(No List4@4 =ViHeader  !4 @4 =ViFooter  !L@L ;x Note Level 2CJPJ _HmH sH tH 6U@!6 ;x Hyperlink >*B*phV^@2V ( Normal (Web)dd[$\$CJOJPJQJaJPOBP rM Free Form!B*CJOJ PJQJ mH phsH 'H$H z z z z/'6%&3z{ WYc3@GHI dH Y   Z ! ORAdBCDuvw"0DEG./e N!!!!!"####$%%%X%I&&&&& '''''''0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0000'0p0003N4"&,- !#  +-"-Z  OO\5Ru5Ut< 9eEe= x L!!@""#}###.$$%8%E%X%%G&&&''XXXXXXXXXXXXXXXXXXXXXXXXXXXl,R$;Xz3\'@0( d >( B S  ?'AEN2AEN4&&'i&&''''' 0?l5;pVb\.!b]D%Z)99nSQGVmzx h^`OJQJo(hHh^`OJQJo(hHohpp^p`OJ QJ o(hHh@ @ ^@ `OJQJo(hHh^`OJQJo(hHoh^`OJ QJ o(hHh^`OJQJo(hHh^`OJQJo(hHohPP^P`OJ QJ o(hHv^v`OJ QJ o(hH^`OJQJ^Jo(hHop^p`OJ QJ o(hH @ @ ^@ `hH. ^`hH. ^`hH. ^`hH. ^`hH. PP^P`hH.^`OJQJ^Jo(hHo^`OJQJ^Jo(hHo pp^p`hH. @ @ ^@ `hH. ^`hH. ^`hH. ^`hH. ^`hH. PP^P`hH.^`OJ QJ o(hH ^`hH. pp^p`hH. @ @ ^@ `hH. ^`hH. ^`hH. ^`hH. ^`hH. PP^P`hH.^`CJOJQJo(^`CJOJQJo(opp^p`CJOJ QJ o(@ @ ^@ `CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(PP^P`CJOJ QJ o(^`o() ^`hH. pLp^p`LhH. @ @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PLP^P`LhH.^`CJOJQJo(^`CJOJQJo(opp^p`CJOJ QJ o(@ @ ^@ `CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(PP^P`CJOJ QJ o(^`CJOJQJo(^`CJOJQJo(opp^p`CJOJ QJ o(@ @ ^@ `CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(PP^P`CJOJ QJ o( ^`hH.   ^ `hH.  L ^ `LhH. xx^x`hH. HH^H`hH. L^`LhH. ^`hH. ^`hH. L^`LhH. 5p1! !1! pV1! 0?SVb]D%)99zx                                     XrϮ.B*|d`&sV         W22" $`QPl2T?.ۨ/mH0,ՌTPLv Ϊl@h:,         '@ `1! .m'p @Unknown GTimes New Roman5Symbol3 ArialQTimes New Roman BoldC0000҉0 Pro W37Courier? Courier NewU Times New Roman Italic3Times7CalibriC$Lucida Grande;Wingdings hE4 E!~4d ( `@/$Resources: Examples of SteganographyWestside High SchoolWestside Community Schools0          Oh+'0`r 4@ ` l x'(Resources: Examples of SteganographyWestside High SchoolNormalWestside Community Schools4Microsoft Word 11.6.0@F#@|+m@3 GpPICTpd ,, MSWD ,<Times New Roman< 2.( C, 2012 B-)o-)ard- Q)@ -\) o-`)f -)Rege- Q)fn-)t-)s- Q) -) U- Q)$n-`)i- Q)v-)ers-`):i-)t-`)y- Q) -) o- Q)f -)Ne- Q):b-)raska-)i ,@Times New Roman Bold@ K-(rRes- 6)tou-)Prces:-0) -)E-0)2x- 6)&a-m)&m- 6)>p-)*les-0)S - 6)o-)&f-0) -)St-0)Ce-) g- 6)&a-)&n- 6))o-)&gra- 6)lph-)Ty-)& -(, < 2-*>Nu-`)=ll-) C-`).i-)p- Q)h-)er 1 ,  )' -\)  -(@,Tak-`)Ni- Q)n-)g-) t- Q)h-)e-\) -`) fi-)rs-)$t-) -`) l-)e-)tte-)1r- Q) -) o- Q)f -)eac- Q)Bh-) w-)1o-)r-)d-) -`) i- Q)n-\) -) t- Q)h-)e -)"c-)o- Q)v-)er-)' -`) m-)'e-)ssage- Q)k -`) f-)o-)r-`)m-)'s-\) -) t- Q)h-)e-) - Q) h-`)i-)dde- Q)Hn-) -`) m-)'essage-\) -`) f-)r-)o-`)m- Q)' -) t-)h-`)i-)s-@ ) - Q(y,W-)/o-)r-`)l-)d-\) - Q) W-)/ar-\)' -) I-`) -) c-)o-`)mm-)Nu- Q)n-`)i-)ca-),t-`)i-)o-)n. - Q)1 -\)  -(, -*9PRESIDE-)N-)#T- Q)'-) S-\) -) EMB- Q)lA-)$RGO-)i -) RU- Q)EL-)ING-)Y -) SHOU- Q)L-)D-\)$ -) H- Q)$A-)$VE-)C -) IMMEDI- Q)A-)$T-)E- Q) -) NO-)HT-)ICE-)Q.-)  GR- Q)RA-)$VE-\)C -(&,SITU- Q)pA-)$T-)ION- Q)Y AF-)MFECTING-) -) IN-)5T-)ERN- Q)dA-)$TION- Q)xA-)$L-) -) L- Q)AW-)S.-)  -) STATEME-)N-)#T- Q) F-))ORESH- Q)A-)$DO- Q)HW-)/S -)(RUIN (_,O- Q)$F-) M- Q)9A-)$NY-)H -) NEUTR- Q)AL-)CS-).- Q)  -) Y-)#EL- Q)=L-)O- Q)$W-)/ JOURN- Q)AL-)CS-\) -) UNI- Q)YF-)YING-)} -) N- Q)$A-)$TIONA- Q)L-) -) EXCITEME-)N-)#T (,IMMENSE- Q)L-)Y-)$.-)  -\)  -(, -*:T- Q)h-)e-) -`) f- Q)i-) rs-)$t-) -`) l-)e-)tt-)e-)r-) -`) f-)r-)o- Q)m -)3eac- Q)Bh-) w-)1o-)r-)d-) -`) yi-)'e-`)l-)ds:-\): -) PERSHIN-)G-)#S- Q)A-)$I- Q)L-)S- Q)F-) ROMNYJUNEI-(  (E, - Q*:A-)$dd-`)2i- Q)n-)g-) t- Q)h-)e-) -) appr-)Yo-)p-)r-`)i-)a-)t-)e- Q) -) spac-`)Xi- Q)n-)g-) -`) yi-)'e-`)l-)ds-\), -) t- Q)h-)e-) -`) m-)'essage-) -(, PERSHING SAI- Q(~L-)S - Q)(F-)R)! OM NY JUNE I-\(L ,@Times New Roman Bold@-(, *9 <-*:C- Q)!h-)a- Q)n-)ge-)/ -) I- Q)n-) - Q) F-)o- Q)n-)t 1j,ld -\) -(,C- Q)!h-)a- Q)n-)ges-)B -`) i- Q)n-\) -`) f-)o- Q)n-)t -`)i- Q)n-)d-`)i-)ca-),t-)e- Q) -`) im-)5p-\)o-)r-)t-)a- Q)n-)ce-), o- Q)&f -`)l-)e-)tt-)ers- Q): -) or wo-)rrds.-)J -(, -\)  , Courier-(, Hey Cody,-=(: -(F,@Want to go to the mall this weekend? My mom has someone she has *6to , Courier New)Zmeet)x" about selling our car. She asked , Courier New(|me)< if I wanted to go. (,No way! My mom will give me mo(ney for pizza (Tafter) the mall. I (,hate )school) pizza.-=) -(+, Your friend,-=(+ -(b,Taysia-=) @-(, *9 <-*:I- Q)n-) -) t- Q)h-`)i-)s-\) -) e- Q)x-)a-`)m-)'p-`)l-)e-),-)  -) t- Q)h-)e-) -) ke- Q)/y-) w-)1o-)rds- Q)= -) are-)= -`) i-)n-\) -) a-`) -) d- Q)i-`) ff-)"ere- Q)=n-\)t-)  -`) f-\)o- Q)n-)t-).- Q)  Wh-)Uere-\)= -) t- Q)h-)e-) - Q) b-)o-)d-`)y-) -\) o-`)f -)t- Q)h-)e -`)"m-)'essage-\) -`) i-)s-\) -`) i- Q)n-@ ) -(H,Courier<), -)t- Q)h-)e-) -) w-\)$o-)rds-`)= -) o- Q)f -)t- Q)h-)e-) -`) m-)'essage-\) -) are-`)= i- Q)n-\) -) Cou-)Zr-)ier- Q)Z -)New<)Z. T- Q)9h-)e t-)0w-)$o -`)%f-)o- Q)n-)t-)s- Q) -) are-)= -) s-`)imil-)Qa-)r-),- Q)  -`) y-)e-\)t-)  -(,d-`)iff-)0er)'e- Q)n-)t -)e- Q)n-)o-)ugh. T- Q)h-)e-) -) w-)$o-)rds- Q)= -`) i-)n-\) -) t- Q)h-)e-) -) d- Q)i-`) ff-)"ere- Q)=n-\)t-)  -`) f-)o- Q)n-\)t-)  -) spe-`)Bll-) -) o-)u-)t-) -) t- Q)h-)e -`)"m-)'essage-\) -) o-`)f- Q) -`)#m-)'ee-),t-) -`) m-)'e-\) -) a-`)f-)te-)#r (,sc- Q))h-)oo-`)2l-).-\)# -)  In-`)6 -) a-\) -) s-`)imil-)Qa-)r-) -`) m-)'a- Q)nn-)2er-)',-)  ) de-`)/li- Q)b-)era-)=t-)e- Q) -`) mi-)5sspe-`)Ulli-)*ngs 1T )D a- Q)#n-)d-) t- Q)h-)e-) -) use- Q)B -) o-`)f- Q) -) spac-`)Xi- Q)n-)gs 11 ), ca- Q)9n-) - Q) b-)e-) -) used- Q)[ -) t-\)o-) -`(,i- Q)n-)d-`)i-)ca-),t-)e- Q) -) s-`)i-)g- Q)n-`)ifi-)-ca- Q),n-)t -)w-)$o-)rds.-\)J -( 3, - Q*9An-)=ot- Q)'h-)er-)' -`) l-)o-)w)$--)t-)ec- Q),h-) s-) t-)ega- Q)En-)o-)grap- Q)Yh-`)i-)c-\) -) t-)ec- Q),hn-`)2i-)que-\)H -`) i- Q)nv-\)2o-`)l-)ve).s crea-)st-`)i- Q)n-)g-) -) a- Q) -) paper-)o t-)e-`)m-)'p-`)l-)a-)te-)# -) to-)' -) o- Q)v-)er-`)'l-)a- Q)y-) -) o- Q)n -)&t-)e- Q)x-\)t-) .- Q)  ( ,F-)o-)r- Q) -) t- Q)h-`)i-)s-),-)  a- Q)#n-`)y-)t- Q)h-`)i- Q)n-)g-\) -`) f-)r-)o- Q)m -)3a-) -) page- Q)^ f-)r-)o-`)m- Q)' -) a - Q)"n-) ewspaper,-\) - Q) b-)oo-)2k- Q) -) o-)r- Q) -) e- Q)v-)en-). -) a- Q) h-)&a- Q)n-)d-) -) w-)$r-`)i-)tt-)e- Q)n-) -`) l-)e-)tt-)e-)r-) ca- Q)9n-) - Q) b-)e-) -) used ( ,as s-)Io-)urce- Q)V -`) m-)'a-)t-)er-`)'i-)a-`)l-).-\)  -) O- Q)$v-)er-`)'l-)a- Q)y-) a-)# t- Q)h-`)i-)n-\) -) p-`)i-)ece-\)B -) o- Q)f -)paper-)o -\) o- Q)v-)er-)' t- Q)h-)e-) -) s-)o-)urce- Q)V -`) m-)'a-)t-)er-`)'i-)a- Q)l-) .-)  -) Y-)$ou-)1 ca- Q)9n-) -) t- Q)h-)e- Q)n-) use-)O a-)" p-`)&i- Q)n-@ ) -( ,to-)' se-`)6l-)ec-),t-) -) t- Q)h-)e) c- Q)#h-)arac-)St-)ers- Q): -`) y-)o-)u- Q) n-)&eed-)E t-\)o- Q) -) crea-)St-)e- Q) -`) y-)ou-)1r- Q) -`) m-)'e-)ssage.- Q)x -) T- Q)h-`)i-)s-\) -) o- Q)v-)er-`)'l-)a-`)y-) -`) i-)s-\) -) t- Q)h-)en-). - Q) -)de-`)/li- Q)v-)ered-)l to-)4 -`) y-)ou-)1r ( R,rec-`)=i-)p-`)i-)e- Q)n-)t -)w- Q)$h-)o -)&w-`)$il- Q)l-\)  -) use-`)B i-)t-\) -) o- Q)v-)e-)r- Q) -) t- Q)h-)e-) -) s-)o-)urce -`)bm-)'a-)t-)er-`)'i-)a-`)l-) -\) t-) o-`) - Q) -)rece-`)Si- Q)v-)e-), t- Q)h-)e-) -`) m-)'essage.-)  ! ! ! !  ! ! !  ! ! !  ! ! !  ! ! !  ! ! !  ! ! !  ! ! !  ! ! ! ՜.+,D՜.+,X hp  ' District 66E ( %Resources: Examples of Steganography Title 8@ _PID_HLINKS'A9N#http://www.pgp.net/pgpnet/pgp-faq/X Khhttp://tech2copycat.wordpress.com/2012/02/06/how-to-hide-data-in-image-audio-video-files-steganography/more-303mH#http://tech2copycat.wordpress.com/HEE]http://technofriends.in/2009/07/13/steganography-how-to-hide-data-in-images-and-audio-files/HEB]http://technofriends.in/2009/07/13/steganography-how-to-hide-data-in-images-and-audio-files/zG?@http://www.symantec.com/connect/articles/steganography-revealedHE<]http://technofriends.in/2009/07/13/steganography-how-to-hide-data-in-images-and-audio-files/HE9]http://technofriends.in/2009/07/13/steganography-how-to-hide-data-in-images-and-audio-files/R<66http://www.garykessler.net/library/steganography.htmlek3#http://www.jjtc.com/pub/r2026a.htmPA00http://www.jjtc.com/pub/tr_95_11_nfj/index.htmlPA-0http://www.jjtc.com/pub/tr_95_11_nfj/index.html;q*7http://www.philzimmermann.com/EN/background/peace.htmlS')http://www.philzimmermann.com/index.htmlJ"$6http://www.sengpielaudio.com/calculator-notenames.htmB>!Fhttp://chemistry.about.com/od/chemistryhowtoguide/a/invisibleinks.htm6 Dhttp://chemistry.about.com/bio/Anne-Marie-Helmenstine-Ph-D-7815.htmL?6http://www.labnol.org/software/hide-data-files/21171/teGhttp://labnol.blogspot.in/2006/10/how-to-hide-secret-documents-or.htmlA!http://labnol.blogspot.in/about/ZCUhttp://linuxpoison.blogspot.com/2011/10/how-to-hide-data-steganography-into-mp3.htmlZCUhttp://linuxpoison.blogspot.com/2011/10/how-to-hide-data-steganography-into-mp3.htmlK -http://lifehacker.com/software/geek-to-live/7 http://ginatrapani.org/*\http://lifehacker.com/230915/geek-to-live--hide-data-in-files-with-easy-steganography-toolsi[4http://www.digitalwatermarkingalliance.org/faqs.aspM2http://www.garykessler.net/library/fsc_stego.html  !"#$%&'()*+,-./012456789:;<=>?ABCDEFGHIJKLMNOPQRSTUVWXYZ[]^_`abcdefghijklmnopqrstuvwxyz{|}~Root Entry FH12Data 31Table@7WordDocumenteSummaryInformation(\rDocumentSummaryInformation8\CompObjX FMicrosoft Word DocumentNB6WWord.Document.8