wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Steganography

profile
Abhishek Jaiswal
Aug 30, 2022
2 Likes
0 Discussions
90 Reads

The word Steganography is derived from two Greek words- ‘stegos’ meaning ‘to cover’ and ‘grayfia’, meaning ‘writing’, thus translating to ‘covered writing’, or ‘hidden writing’. Steganography is a method of hiding secret data, by embedding it into an audio, video, image, or text file. It is one of the methods employed to protect secret or sensitive data from malicious attacks. 

How is it different from cryptography? 

Cryptography and steganography are both methods used to hide or protect secret data. However, they differ in the respect that cryptography makes the data unreadable, or hides the meaning of the data, while steganography hides the existence of the data. 

In layman’s terms, cryptography is similar to writing a letter in a secret language: people can read it, but won’t understand what it means. However, the existence of a (probably secret) message would be obvious to anyone who sees the letter, and if someone either knows or figures out your secret language, then your message can easily be read. 

If you were to use steganography in the same situation, you would hide the letter inside a pair of socks that you would be gifting the intended recipient of the letter. To those who don’t know about the message, it would look like there was nothing more to your gift than the socks.

Different Types of Steganography : 

  • Text Steganography − There is steganography in text files, which entails secretly storing information. In this method, the hidden data is encoded into the letter of each word. 
  • Image Steganography − The second type of steganography is image steganography, which entails concealing data by using an image of a different object as a cover. 
  • Audio Steganography − It is the science of hiding data in sound. Used digitally, it protects against unauthorized reproduction. 
  • Video Steganography − Video steganography is a method of secretly embedding data or other files within a video file on a computer.  Video steganography typically employs the following file formats: H.264, MP4, MPEG, and AVI.
  • Network or Protocol Steganography − It involves concealing data by using a network protocol like TCP, UDP, ICMP, IP, etc., as a cover object. 
  • White Space Steganography -  It is a technique to hide information in a text file using extra blank space inserted in between words covering file.

Tools to perform steganography : 

  • OpenStego
  • QuickStego
  • Hide’N’Send
  • Our Secret
  • Image Steganography

 

 

 


Comments ()


Sign in

Read Next

Senseless Teeths

Blog banner

What is online marketing and why do you need to know about it ?

Blog banner

Online Education

Blog banner

virtual machine

Blog banner

Life of a 2020-2021 student

Blog banner

Oracle Corporation

Blog banner

Junk food vs healthy food

Blog banner

GIS REMOTE SENSING

Blog banner

Direct Memory Access

Blog banner

Fault Tolerance in an Operating System

Blog banner

Threat from Inside: Educating the Employees Against Cyber Threats

Blog banner

Impacts of Data Breach On Companies Challenges and Prevention

Blog banner

Service transistion under difficult conditions

Blog banner

Cache Memory

Blog banner

Artical on FreshBooks

Blog banner

TOP 5 GAMING GADGETS (2024)

Blog banner

Deadlock and Starvation in an Operating System

Blog banner

Deadlock

Blog banner

Review on Cyber Forensics and its Analysis Tools

Blog banner

Deadlock and Starvation

Blog banner

**THE MUJAWARR: Transforming the Logistics Industry**

Blog banner

Jamming Attacks in Network Security: Disrupting Communication Signals

Blog banner

"Audit" In Data Science

Blog banner

Sweet and Sour Mango Pickle (Gol Keri)

Blog banner

Memory Management in Operating System

Blog banner

Why am I never satisfied with my Life?

Blog banner

Zomato's Secret Digital Marketing Techniques!

Blog banner

Is Pursuing a Dance Career in India Worth it?

Blog banner

evolution of operating system - Disha Parekh

Blog banner

Expert System In AI

Blog banner

Blog on health and fitness

Blog banner

What is Password Cracking ? and it's Techniques.

Blog banner

IP Address

Blog banner

Message Passing in OS

Blog banner

MY MOST THRILLED TREK ..... BHAIRAVGAD

Blog banner

Cryptanalysis tool

Blog banner

CYBERBULLYING: Negative comments!

Blog banner

To travel is to live

Blog banner

What is Spyware? and examples of them.

Blog banner

Biometric Authentication Vulnerabilities

Blog banner

Beyond the Track: Why the Best Hotel in Arcadia, Florida, Completes Your IMSA Sebring Getaway

Blog banner

Photography

Blog banner