Lecture 32: Steganography (hidden messages) - Richard Buckland UNSW

Поделиться
HTML-код
  • Опубликовано: 16 ноя 2024

Комментарии • 33

  • @Starcraftmazter
    @Starcraftmazter 16 лет назад +2

    Finally had time to watch this, since I was MIA during that lecture.
    Absolutely brilliant!!!

  • @khadijahalsmiere3718
    @khadijahalsmiere3718 4 года назад +3

    Its 2020 and I am watching this, thank you very much

  • @ingdabit
    @ingdabit 4 года назад

    AWESOME - Thanks Richard, so lucid, perfectly explained.

  • @ILiveThereforeIAM
    @ILiveThereforeIAM 14 лет назад

    Very good job, from one instructor to another. You have class, and the ability to simply complicated subjects. Only one regret, wish I had you as an instructor. :)

  • @BGroothedde
    @BGroothedde 10 лет назад

    Fascinating lecture, I've been toying with steganography in PureBasic and Assembly in combination with compression and encryption (1-bit or 2-bit per color value and optionally alpha channel). The stories in this lecture are amusing to say the least!

  • @rogerak80
    @rogerak80 14 лет назад

    I like how the smiley face game was not only about the finished drawing, but the way it was drew as well.

  • @romeo8627
    @romeo8627 15 лет назад

    Thank you for the info. I had studied "Cryptography and Network Security: Principles and Practice, Second Edition. by William Stallings" in engineering and also went through few chapters of Applied Cryptography. Both of which I had liked a lot.
    Thank you for the recommendations. I will get "The Codebreakers" first. Have a nice day!

  • @unswelearning
    @unswelearning  15 лет назад +1

    Yes Kahn's brilliant book is "The Codebreakers" and is the best book on the history and principles of cryptography I've had the pleasure to read. The Code Book is another popular book on codes but i've not read it, quite a few of my students like it however. A book I can strong recommend is "Decrypted Secrets" by FL Bauer, and of course Applied Cryptography by Bruce Schneier is a brilliant introduction to the field since the second world war.

  • @NicolasTsagarides
    @NicolasTsagarides 15 лет назад +1

    I am so jealous of this class... In my school they teach as really ancient stuff (like pascal)
    I hope we'll learn in a more accelerated way @ uni

  • @filosophy42
    @filosophy42 15 лет назад +2

    where Can i find mOre infOrmation on the godeL eScHer bach book? I'm inTrigued

  • @AnanyaBhardwaj._.
    @AnanyaBhardwaj._. 5 месяцев назад

    Can someone tell the name of the other book he said is very good? Couldn't get it

  • @sabriath
    @sabriath 14 лет назад

    @XxAznDarknezZxX : the name is simply "simulation", the magnitude he speaks of is one that simulates space-time itself with all the forces of the universe "in a bottle" so-to-speak. There is no _real_ way to do that (because it would take the power and size of the universe to simulate a universe), you can do a miniature one, but the chances of sentience becomes close to nil (as even out universe is pretty small on our own chance). I'm not sure of any books directly

  • @GirlsSociety2
    @GirlsSociety2 11 лет назад

    Security via obscurity is interesting, hiding things in plain view!

  • @sabriath
    @sabriath 14 лет назад

    @XxAznDarknezZxX : As I stated, the chances of life in a universe smaller than our own becomes close to 0 (drake's equation works on the expanses of our universe, if moved to something smaller, the equation drops off). Recursion is even less likely due to information entropy. You can take out one of the universe "powers" (dimension, gravity, radiation, etc.) to make it simpler, but those creatures would have to reduce it again, and again (info entropy).

  • @moussamust9612
    @moussamust9612 10 лет назад

    Hi , i have a question : i have a picture, in this picture we have a hidden key using steganography LSB, how can i pick up the key

  • @hellobye3221
    @hellobye3221 4 года назад

    Gr8 teacher

  • @SaiKumar-cj1ib
    @SaiKumar-cj1ib 6 лет назад

    What is the difference between watermarking and steganography?

  • @kkkkkiiiiisssss
    @kkkkkiiiiisssss 15 лет назад

    Can you please come to london and teach my Forensic course, i've learnt more in this 30mins than i have in a year at my uni, thanks!

  • @BDfoxmore
    @BDfoxmore 8 лет назад +1

    WHAT IF you use Cryptography inside a Steganography? and the steganographys text is protected from a pass wich is unknown, but it can be seen on the picture itself which is hiding evrything?, and somethink more for example lets say that the way to see the pass remains hiden also on the pic, something like counting down thinks or mesure distance etc. etc. so you have to use logic/maths on the pic. this think becames somethink like a puzzle. but could it be posible to hack the pass? ther are some programs that Encrypt text in pics with pass, is it posible to hack that pass with some way? and if yes! how?

    • @BDfoxmore
      @BDfoxmore 8 лет назад

      +rtyuty htyhtyh lots of thems!!! i know. but if you follow my logic you will see how facinatic it is.

  • @mohammedalnaciri3880
    @mohammedalnaciri3880 10 лет назад

    Thanks sir and you speak vary good

  • @headstrong440
    @headstrong440 15 лет назад

    Great Video,i subscribed!

  • @chelle1504
    @chelle1504 14 лет назад

    does anyone know the date of when this lecture was? I want to reference in in my essay

  • @agentx3
    @agentx3 16 лет назад

    this has been taking me about 2 hours to finish since i kept pausing

  • @romeo8627
    @romeo8627 15 лет назад

    Shouldn't the book be "The Codebreaker" by David Khan.. And not "The Code Book"..??
    I am confused..

  • @auro_da
    @auro_da 15 лет назад

    Good Video. : )

  • @chensam87
    @chensam87 15 лет назад

    thank you sooooooooooo much

  • @orion3253
    @orion3253 10 лет назад

    cool stuff

  • @h7opolo
    @h7opolo Год назад

    21:03 it's called paralanguage

  • @CharIie83
    @CharIie83 7 лет назад

    LOL. And, why use numbers to encrypt when you could just use say, raw information, that when put into a 3D printer, would print a message, that the guy who got, would know was in arabian phonetics, that when pronounced backwards, could be deciphered into numbers.
    How would anyone know the specific steps necessary? This approach seems alot more safe than providing a key for decrypting

  • @_mvr_
    @_mvr_ 13 лет назад

    Nice guy :D

  • @0day_
    @0day_ 14 лет назад

    @Orione hahaha me too :D

  • @Ak7kid
    @Ak7kid 16 лет назад

    i swear people like this get paid per comment and rating?