wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Steganography

profile
Abhishek Jaiswal
Aug 30, 2022
2 Likes
0 Discussions
90 Reads

The word Steganography is derived from two Greek words- ‘stegos’ meaning ‘to cover’ and ‘grayfia’, meaning ‘writing’, thus translating to ‘covered writing’, or ‘hidden writing’. Steganography is a method of hiding secret data, by embedding it into an audio, video, image, or text file. It is one of the methods employed to protect secret or sensitive data from malicious attacks. 

How is it different from cryptography? 

Cryptography and steganography are both methods used to hide or protect secret data. However, they differ in the respect that cryptography makes the data unreadable, or hides the meaning of the data, while steganography hides the existence of the data. 

In layman’s terms, cryptography is similar to writing a letter in a secret language: people can read it, but won’t understand what it means. However, the existence of a (probably secret) message would be obvious to anyone who sees the letter, and if someone either knows or figures out your secret language, then your message can easily be read. 

If you were to use steganography in the same situation, you would hide the letter inside a pair of socks that you would be gifting the intended recipient of the letter. To those who don’t know about the message, it would look like there was nothing more to your gift than the socks.

Different Types of Steganography : 

  • Text Steganography − There is steganography in text files, which entails secretly storing information. In this method, the hidden data is encoded into the letter of each word. 
  • Image Steganography − The second type of steganography is image steganography, which entails concealing data by using an image of a different object as a cover. 
  • Audio Steganography − It is the science of hiding data in sound. Used digitally, it protects against unauthorized reproduction. 
  • Video Steganography − Video steganography is a method of secretly embedding data or other files within a video file on a computer.  Video steganography typically employs the following file formats: H.264, MP4, MPEG, and AVI.
  • Network or Protocol Steganography − It involves concealing data by using a network protocol like TCP, UDP, ICMP, IP, etc., as a cover object. 
  • White Space Steganography -  It is a technique to hide information in a text file using extra blank space inserted in between words covering file.

Tools to perform steganography : 

  • OpenStego
  • QuickStego
  • Hide’N’Send
  • Our Secret
  • Image Steganography

 

 

 


Comments ()


Sign in

Read Next

Jio .....A Revolution ?? ??

Blog banner

Heart Fulness Meditation

Blog banner

Balance

Blog banner

Operating system

Blog banner

Raid

Blog banner

Service Operations Principles

Blog banner

COMMUNICATION

Blog banner

Operating Systems Overview

Blog banner

The Khan mehtab transforming the modular switches

Blog banner

security controls

Blog banner

Full Disk Encryption on Digital Forensics

Blog banner

How return on investment is defined in IT services

Blog banner

Video games

Blog banner

Footprinting

Blog banner

Deadlock and Starvation

Blog banner

“CONSISTENCY” in Social Media Marketing

Blog banner

E-learning in today's world

Blog banner

Traveling

Blog banner

How China Regained It's World's Largest Growing Economy Status

Blog banner

How Reading Books Shape a Child’s Imagination and Thinking?

Blog banner

Self Confidence

Blog banner

Deadlock

Blog banner

File management -disha parekh

Blog banner

Short-Form Video Marketing: Why It's Dominating the Internet

Blog banner

Social Media Sentiment Analysis

Blog banner

38_Network Sniffing Techniques_SBC

Blog banner

OS Assignment-3

Blog banner

Process states

Blog banner

Service transistion under difficult conditions

Blog banner

Facebook Shut Down an AI Program!!! Facebook AI bots became Terminators???

Blog banner

Royal enfield

Blog banner

10 Signs That Prove YOU are his FIRST priority.

Blog banner

MULTITHREADING:ENHANCEING PERFORMANCE AND EFFICIENCY IN COMPUTING

Blog banner

Direct Memory Access

Blog banner

Life lesson

Blog banner

Modern Operating Systems

Blog banner

TRAIN TRAVELING

Blog banner

10 Rare Historic Pictures that are Ever Captured

Blog banner

Virtual Memory

Blog banner

Meal Maharaj — 3 CP, 5 CP, 8 CP. Same Love, Different Portions

Blog banner

Instagram

Blog banner

Data Science in Mental Health Prediction

Blog banner