wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Steganography

profile
Abhishek Jaiswal
Aug 30, 2022
2 Likes
0 Discussions
90 Reads

The word Steganography is derived from two Greek words- ‘stegos’ meaning ‘to cover’ and ‘grayfia’, meaning ‘writing’, thus translating to ‘covered writing’, or ‘hidden writing’. Steganography is a method of hiding secret data, by embedding it into an audio, video, image, or text file. It is one of the methods employed to protect secret or sensitive data from malicious attacks. 

How is it different from cryptography? 

Cryptography and steganography are both methods used to hide or protect secret data. However, they differ in the respect that cryptography makes the data unreadable, or hides the meaning of the data, while steganography hides the existence of the data. 

In layman’s terms, cryptography is similar to writing a letter in a secret language: people can read it, but won’t understand what it means. However, the existence of a (probably secret) message would be obvious to anyone who sees the letter, and if someone either knows or figures out your secret language, then your message can easily be read. 

If you were to use steganography in the same situation, you would hide the letter inside a pair of socks that you would be gifting the intended recipient of the letter. To those who don’t know about the message, it would look like there was nothing more to your gift than the socks.

Different Types of Steganography : 

  • Text Steganography − There is steganography in text files, which entails secretly storing information. In this method, the hidden data is encoded into the letter of each word. 
  • Image Steganography − The second type of steganography is image steganography, which entails concealing data by using an image of a different object as a cover. 
  • Audio Steganography − It is the science of hiding data in sound. Used digitally, it protects against unauthorized reproduction. 
  • Video Steganography − Video steganography is a method of secretly embedding data or other files within a video file on a computer.  Video steganography typically employs the following file formats: H.264, MP4, MPEG, and AVI.
  • Network or Protocol Steganography − It involves concealing data by using a network protocol like TCP, UDP, ICMP, IP, etc., as a cover object. 
  • White Space Steganography -  It is a technique to hide information in a text file using extra blank space inserted in between words covering file.

Tools to perform steganography : 

  • OpenStego
  • QuickStego
  • Hide’N’Send
  • Our Secret
  • Image Steganography

 

 

 


Comments ()


Sign in

Read Next

Security Breaches in Stock market trading

Blog banner

Everything You Need for a Perfect Stay in Arcadia, Florida, USA.

Blog banner

ROLE OF THE COMPUTER FORENSICS TOOLS AND TECHNIQUES

Blog banner

MAILFENCE

Blog banner

Ola

Blog banner

Positioning: The battle of the minds

Blog banner

Why Festivals Are the Best Classrooms for Young Minds?

Blog banner

KASHMIR TRIPS

Blog banner

FIREWALL

Blog banner

Scheduling

Blog banner

Cyber Forensics in Healthcare: Protecting Patient Data and Preventing Breaches

Blog banner

Topic: Sessions in Operating system

Blog banner

MAJOR ACHIEVEMENTS OF OS

Blog banner

OS Assignment 3

Blog banner

POSITIVE ATTITUDE IN LIFE

Blog banner

PYTHON

Blog banner

Bots and Cyber Security

Blog banner

Preparing Students for Higher Education: How International Schools Shape Future Success

Blog banner

Data-Driven Prediction of Virtual Item Prices in Online Games

Blog banner

VPN

Blog banner

Cherish the Craft — Essential Tips to Maintain Your Patola Collection

Blog banner

MEMORY FORENSIC ACQUISITION AND ANALYSISOF MEMORY AND ITS TOOLS COMPARISON

Blog banner

Platonic Solids

Blog banner

File management

Blog banner

Key to success in Sports

Blog banner

Steps to create an Ubuntu EC2 Instance with GUI in AWS

Blog banner

Virtual machine.

Blog banner

Security in Cloud Computing

Blog banner

Smart Shoephone: Is that technology overdose!?

Blog banner

Odoo

Blog banner

Security Issues and Countermeasures

Blog banner

Indian Food

Blog banner

SQL Injection

Blog banner

Rock, Paper, Scissors Game in Common Lisp

Blog banner

GIS Applications: How Different Industries are Leveraging Geospatial Data

Blog banner

Exploring Virtual Machines and Computer Forensic Validation Tools

Blog banner

Memory management

Blog banner

Scheduling in Operating Systems

Blog banner

Classification Algorithms (Decision trees, SVM, Logistic regreession)

Blog banner

FRIENDSHIP

Blog banner

A small world of Sockets

Blog banner

Deadlock and starvation

Blog banner