wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Steganography

profile
Abhishek Jaiswal
Aug 30, 2022
2 Likes
0 Discussions
90 Reads

The word Steganography is derived from two Greek words- ‘stegos’ meaning ‘to cover’ and ‘grayfia’, meaning ‘writing’, thus translating to ‘covered writing’, or ‘hidden writing’. Steganography is a method of hiding secret data, by embedding it into an audio, video, image, or text file. It is one of the methods employed to protect secret or sensitive data from malicious attacks. 

How is it different from cryptography? 

Cryptography and steganography are both methods used to hide or protect secret data. However, they differ in the respect that cryptography makes the data unreadable, or hides the meaning of the data, while steganography hides the existence of the data. 

In layman’s terms, cryptography is similar to writing a letter in a secret language: people can read it, but won’t understand what it means. However, the existence of a (probably secret) message would be obvious to anyone who sees the letter, and if someone either knows or figures out your secret language, then your message can easily be read. 

If you were to use steganography in the same situation, you would hide the letter inside a pair of socks that you would be gifting the intended recipient of the letter. To those who don’t know about the message, it would look like there was nothing more to your gift than the socks.

Different Types of Steganography : 

  • Text Steganography − There is steganography in text files, which entails secretly storing information. In this method, the hidden data is encoded into the letter of each word. 
  • Image Steganography − The second type of steganography is image steganography, which entails concealing data by using an image of a different object as a cover. 
  • Audio Steganography − It is the science of hiding data in sound. Used digitally, it protects against unauthorized reproduction. 
  • Video Steganography − Video steganography is a method of secretly embedding data or other files within a video file on a computer.  Video steganography typically employs the following file formats: H.264, MP4, MPEG, and AVI.
  • Network or Protocol Steganography − It involves concealing data by using a network protocol like TCP, UDP, ICMP, IP, etc., as a cover object. 
  • White Space Steganography -  It is a technique to hide information in a text file using extra blank space inserted in between words covering file.

Tools to perform steganography : 

  • OpenStego
  • QuickStego
  • Hide’N’Send
  • Our Secret
  • Image Steganography

 

 

 


Comments ()


Sign in

Read Next

Survey of Which Movies Types people are Prefer to Watch in India.

Blog banner

The Rise of Polo Tourism in the USA: How Travellers Are Blending Luxury Stays with Elite Sports

Blog banner

Ghee vs. Coconut Oil vs. Mustard Oil: Which Cooking Fat Wins for Indian Food?

Blog banner

Big Data Architecture

Blog banner

Craziness of dream 11 and how it impacts on our life

Blog banner

Direct Memory Access

Blog banner

Memory Management in Operating System

Blog banner

Fitness

Blog banner

?How long does wisdom tooth pain last?

Blog banner

Pilgrimage at LOC: A privilege and a paradox

Blog banner

Memory management

Blog banner

Modern Operating System - Khush Bagaria

Blog banner

Image Steganalysis in Digital Forensics

Blog banner

When Is the Right Time to Enrol My Toddler Into Preschool? NEP

Blog banner

Short note on Microsoft office

Blog banner

How To Secure Operating Systems ?

Blog banner

Game Theory in Blockchain

Blog banner

Junk food vs healthy food

Blog banner

Operating system

Blog banner

Defining youtubr

Blog banner

Place to visit in pune

Blog banner

Social Media Marketing Trends 2022

Blog banner

Jira Software

Blog banner

social media issue

Blog banner

Cache memory

Blog banner

Memory Hierarchy

Blog banner

Things You Should Leave Behind In 2025, Whilst In 2026

Blog banner

Rules and Regulations of Networking: "Standards and Protocols" - Part 1

Blog banner

Define Instagram.

Blog banner

Virtual Memory

Blog banner

SPEM

Blog banner

Paginng In OS

Blog banner

Service design process in ITSM

Blog banner

Memory management

Blog banner

IP ADDRESS

Blog banner

Blockchain

Blog banner

File management

Blog banner

How to lose belly fat

Blog banner

Process Description

Blog banner

VIRTUAL MACHINES

Blog banner

The War With Cold On Earth

Blog banner

Processing Crime and Incident Scenes

Blog banner