wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Steganography

profile
Abhishek Jaiswal
Aug 30, 2022
2 Likes
0 Discussions
90 Reads

The word Steganography is derived from two Greek words- ‘stegos’ meaning ‘to cover’ and ‘grayfia’, meaning ‘writing’, thus translating to ‘covered writing’, or ‘hidden writing’. Steganography is a method of hiding secret data, by embedding it into an audio, video, image, or text file. It is one of the methods employed to protect secret or sensitive data from malicious attacks. 

How is it different from cryptography? 

Cryptography and steganography are both methods used to hide or protect secret data. However, they differ in the respect that cryptography makes the data unreadable, or hides the meaning of the data, while steganography hides the existence of the data. 

In layman’s terms, cryptography is similar to writing a letter in a secret language: people can read it, but won’t understand what it means. However, the existence of a (probably secret) message would be obvious to anyone who sees the letter, and if someone either knows or figures out your secret language, then your message can easily be read. 

If you were to use steganography in the same situation, you would hide the letter inside a pair of socks that you would be gifting the intended recipient of the letter. To those who don’t know about the message, it would look like there was nothing more to your gift than the socks.

Different Types of Steganography : 

  • Text Steganography − There is steganography in text files, which entails secretly storing information. In this method, the hidden data is encoded into the letter of each word. 
  • Image Steganography − The second type of steganography is image steganography, which entails concealing data by using an image of a different object as a cover. 
  • Audio Steganography − It is the science of hiding data in sound. Used digitally, it protects against unauthorized reproduction. 
  • Video Steganography − Video steganography is a method of secretly embedding data or other files within a video file on a computer.  Video steganography typically employs the following file formats: H.264, MP4, MPEG, and AVI.
  • Network or Protocol Steganography − It involves concealing data by using a network protocol like TCP, UDP, ICMP, IP, etc., as a cover object. 
  • White Space Steganography -  It is a technique to hide information in a text file using extra blank space inserted in between words covering file.

Tools to perform steganography : 

  • OpenStego
  • QuickStego
  • Hide’N’Send
  • Our Secret
  • Image Steganography

 

 

 


Comments ()


Sign in

Read Next

BENIFITS OF YOGA

Blog banner

Deadlocks in Operating System

Blog banner

Affiliate Marketing V/S Influencer Marketing

Blog banner

operating system

Blog banner

Stories Woven in Silk: The Meaning Behind Patola Motifs

Blog banner

Why Should You Schedule Tweets on Twitter?

Blog banner

Interrupts in OS

Blog banner

Krishna Rao SAP ID--53003230076

Blog banner

Memory managment

Blog banner

Hacking

Blog banner

Privacy-Enhancing Computation Techniques

Blog banner

Mango Raisin Chutney (sweet mango raisin spread)

Blog banner

Developments in Modern Operating Systems

Blog banner

BITCOIN WALLET

Blog banner

Tools to support CSI activities

Blog banner

Things You Should Leave Behind In 2025, Whilst In 2026

Blog banner

child Labour

Blog banner

"The Benefits of Using GIS in Agriculture"

Blog banner

Education: Key to your Prosperity

Blog banner

Throttle engine ’Sneak peek into the future’

Blog banner

Predictive Analysis - Ek Overview

Blog banner

Linker

Blog banner

Deadlock in operating system

Blog banner

EdTech (Education Technology)

Blog banner

gis substation

Blog banner

Proton mail

Blog banner

Cyber Forensic in the Banking sector

Blog banner

Sage

Blog banner

Mumbai famous street food

Blog banner

GIS Mapping

Blog banner

Hey Aryan here

Blog banner

Corporate Discipline.

Blog banner

Multiple processor scheduling

Blog banner

Race Condition in Operating Theatre

Blog banner

Mendeley (management software)

Blog banner

Vulnerabilities in OnePlus Devices

Blog banner

THE ROLE OF CYBER FORENSICS IN CRIMINOLOGY

Blog banner

How to invest in Indian Stock Market ? ~ Tutorial 1

Blog banner

Modern Teaching Methods: Why Inquiry-based & Experiential Learning Works Best

Blog banner

Data Warehouse Bus Matrix

Blog banner

Buffering

Blog banner

Vikrant’s first blog

Blog banner