Lecture 32: Steganography (hidden messages) - Richard Buckland UNSW

แชร์
ฝัง
  • เผยแพร่เมื่อ 17 ม.ค. 2025

ความคิดเห็น • 33

  • @Starcraftmazter
    @Starcraftmazter 16 ปีที่แล้ว +2

    Finally had time to watch this, since I was MIA during that lecture.
    Absolutely brilliant!!!

  • @ILiveThereforeIAM
    @ILiveThereforeIAM 14 ปีที่แล้ว

    Very good job, from one instructor to another. You have class, and the ability to simply complicated subjects. Only one regret, wish I had you as an instructor. :)

  • @khadijahalsmiere3718
    @khadijahalsmiere3718 4 ปีที่แล้ว +3

    Its 2020 and I am watching this, thank you very much

  • @ingdabit
    @ingdabit 4 ปีที่แล้ว

    AWESOME - Thanks Richard, so lucid, perfectly explained.

  • @romeo8627
    @romeo8627 15 ปีที่แล้ว

    Thank you for the info. I had studied "Cryptography and Network Security: Principles and Practice, Second Edition. by William Stallings" in engineering and also went through few chapters of Applied Cryptography. Both of which I had liked a lot.
    Thank you for the recommendations. I will get "The Codebreakers" first. Have a nice day!

  • @unswelearning
    @unswelearning  15 ปีที่แล้ว +1

    Yes Kahn's brilliant book is "The Codebreakers" and is the best book on the history and principles of cryptography I've had the pleasure to read. The Code Book is another popular book on codes but i've not read it, quite a few of my students like it however. A book I can strong recommend is "Decrypted Secrets" by FL Bauer, and of course Applied Cryptography by Bruce Schneier is a brilliant introduction to the field since the second world war.

  • @rogerak80
    @rogerak80 14 ปีที่แล้ว

    I like how the smiley face game was not only about the finished drawing, but the way it was drew as well.

  • @filosophy42
    @filosophy42 15 ปีที่แล้ว +2

    where Can i find mOre infOrmation on the godeL eScHer bach book? I'm inTrigued

  • @BGroothedde
    @BGroothedde 10 ปีที่แล้ว

    Fascinating lecture, I've been toying with steganography in PureBasic and Assembly in combination with compression and encryption (1-bit or 2-bit per color value and optionally alpha channel). The stories in this lecture are amusing to say the least!

  • @NicolasTsagarides
    @NicolasTsagarides 15 ปีที่แล้ว +1

    I am so jealous of this class... In my school they teach as really ancient stuff (like pascal)
    I hope we'll learn in a more accelerated way @ uni

  • @sabriath
    @sabriath 14 ปีที่แล้ว

    @XxAznDarknezZxX : As I stated, the chances of life in a universe smaller than our own becomes close to 0 (drake's equation works on the expanses of our universe, if moved to something smaller, the equation drops off). Recursion is even less likely due to information entropy. You can take out one of the universe "powers" (dimension, gravity, radiation, etc.) to make it simpler, but those creatures would have to reduce it again, and again (info entropy).

  • @sabriath
    @sabriath 14 ปีที่แล้ว

    @XxAznDarknezZxX : the name is simply "simulation", the magnitude he speaks of is one that simulates space-time itself with all the forces of the universe "in a bottle" so-to-speak. There is no _real_ way to do that (because it would take the power and size of the universe to simulate a universe), you can do a miniature one, but the chances of sentience becomes close to nil (as even out universe is pretty small on our own chance). I'm not sure of any books directly

  • @hellobye3221
    @hellobye3221 4 ปีที่แล้ว

    Gr8 teacher

  • @headstrong440
    @headstrong440 15 ปีที่แล้ว

    Great Video,i subscribed!

  • @mohammedalnaciri3880
    @mohammedalnaciri3880 10 ปีที่แล้ว

    Thanks sir and you speak vary good

  • @kkkkkiiiiisssss
    @kkkkkiiiiisssss 15 ปีที่แล้ว

    Can you please come to london and teach my Forensic course, i've learnt more in this 30mins than i have in a year at my uni, thanks!

  • @chelle1504
    @chelle1504 14 ปีที่แล้ว

    does anyone know the date of when this lecture was? I want to reference in in my essay

  • @AnanyaBhardwaj._.
    @AnanyaBhardwaj._. 7 หลายเดือนก่อน

    Can someone tell the name of the other book he said is very good? Couldn't get it

  • @GirlsSociety2
    @GirlsSociety2 11 ปีที่แล้ว

    Security via obscurity is interesting, hiding things in plain view!

  • @romeo8627
    @romeo8627 15 ปีที่แล้ว

    Shouldn't the book be "The Codebreaker" by David Khan.. And not "The Code Book"..??
    I am confused..

  • @orion3253
    @orion3253 10 ปีที่แล้ว

    cool stuff

  • @chensam87
    @chensam87 15 ปีที่แล้ว

    thank you sooooooooooo much

  • @auro_da
    @auro_da 15 ปีที่แล้ว

    Good Video. : )

  • @moussamust9612
    @moussamust9612 10 ปีที่แล้ว

    Hi , i have a question : i have a picture, in this picture we have a hidden key using steganography LSB, how can i pick up the key

  • @SaiKumar-cj1ib
    @SaiKumar-cj1ib 7 ปีที่แล้ว

    What is the difference between watermarking and steganography?

  • @h7opolo
    @h7opolo ปีที่แล้ว

    21:03 it's called paralanguage

  • @BDfoxmore
    @BDfoxmore 9 ปีที่แล้ว +1

    WHAT IF you use Cryptography inside a Steganography? and the steganographys text is protected from a pass wich is unknown, but it can be seen on the picture itself which is hiding evrything?, and somethink more for example lets say that the way to see the pass remains hiden also on the pic, something like counting down thinks or mesure distance etc. etc. so you have to use logic/maths on the pic. this think becames somethink like a puzzle. but could it be posible to hack the pass? ther are some programs that Encrypt text in pics with pass, is it posible to hack that pass with some way? and if yes! how?

    • @BDfoxmore
      @BDfoxmore 9 ปีที่แล้ว

      +rtyuty htyhtyh lots of thems!!! i know. but if you follow my logic you will see how facinatic it is.

  • @_mvr_
    @_mvr_ 13 ปีที่แล้ว

    Nice guy :D

  • @agentx3
    @agentx3 16 ปีที่แล้ว

    this has been taking me about 2 hours to finish since i kept pausing

  • @0day_
    @0day_ 14 ปีที่แล้ว

    @Orione hahaha me too :D

  • @CharIie83
    @CharIie83 7 ปีที่แล้ว

    LOL. And, why use numbers to encrypt when you could just use say, raw information, that when put into a 3D printer, would print a message, that the guy who got, would know was in arabian phonetics, that when pronounced backwards, could be deciphered into numbers.
    How would anyone know the specific steps necessary? This approach seems alot more safe than providing a key for decrypting

  • @Ak7kid
    @Ak7kid 16 ปีที่แล้ว

    i swear people like this get paid per comment and rating?