wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Steganography

profile
Abhishek Jaiswal
Aug 30, 2022
2 Likes
0 Discussions
90 Reads

The word Steganography is derived from two Greek words- ‘stegos’ meaning ‘to cover’ and ‘grayfia’, meaning ‘writing’, thus translating to ‘covered writing’, or ‘hidden writing’. Steganography is a method of hiding secret data, by embedding it into an audio, video, image, or text file. It is one of the methods employed to protect secret or sensitive data from malicious attacks. 

How is it different from cryptography? 

Cryptography and steganography are both methods used to hide or protect secret data. However, they differ in the respect that cryptography makes the data unreadable, or hides the meaning of the data, while steganography hides the existence of the data. 

In layman’s terms, cryptography is similar to writing a letter in a secret language: people can read it, but won’t understand what it means. However, the existence of a (probably secret) message would be obvious to anyone who sees the letter, and if someone either knows or figures out your secret language, then your message can easily be read. 

If you were to use steganography in the same situation, you would hide the letter inside a pair of socks that you would be gifting the intended recipient of the letter. To those who don’t know about the message, it would look like there was nothing more to your gift than the socks.

Different Types of Steganography : 

  • Text Steganography − There is steganography in text files, which entails secretly storing information. In this method, the hidden data is encoded into the letter of each word. 
  • Image Steganography − The second type of steganography is image steganography, which entails concealing data by using an image of a different object as a cover. 
  • Audio Steganography − It is the science of hiding data in sound. Used digitally, it protects against unauthorized reproduction. 
  • Video Steganography − Video steganography is a method of secretly embedding data or other files within a video file on a computer.  Video steganography typically employs the following file formats: H.264, MP4, MPEG, and AVI.
  • Network or Protocol Steganography − It involves concealing data by using a network protocol like TCP, UDP, ICMP, IP, etc., as a cover object. 
  • White Space Steganography -  It is a technique to hide information in a text file using extra blank space inserted in between words covering file.

Tools to perform steganography : 

  • OpenStego
  • QuickStego
  • Hide’N’Send
  • Our Secret
  • Image Steganography

 

 

 


Comments ()


Sign in

Read Next

Child labour

Blog banner

1 Dentist in Maroubra, Sydney and her 10 obsessions

Blog banner

The Golden Temple , Amritsar

Blog banner

Types of Threads

Blog banner

Proton mail

Blog banner

Internet of Things

Blog banner

Importance of modern technology era

Blog banner

The Future of Cybersecurity: Trends, Challenges, and Strategies

Blog banner

Deadlock and Starvation

Blog banner

The Art of Slow Fashion: Why Patola Defines Sustainable Luxury

Blog banner

What does the Australian summer have in store for your oral health?

Blog banner

How to lose belly fat

Blog banner

SMARTSHEET MANAGEMENT SOFTWARE

Blog banner

Exploring Virtual Machines and Computer Forensic Validation Tools

Blog banner

Direct Memory Access

Blog banner

Linux Memory Management

Blog banner

Race condition

Blog banner

Why Inconel 625 and Monel 400 Remain Unbeatable in Refinery Applications?

Blog banner

Decoding the Weave — How to Identify Original Patola Art on a Fabric

Blog banner

An Overview of Virtual Machines

Blog banner

Maharashtrian culture: Tradition, Art, Food

Blog banner

Why Skipping Afternoon Meals Affects More Than Just Your Hunger?

Blog banner

I/O Management and Disk Scheduling

Blog banner

Odoo

Blog banner

Throttle engine ’Sneak peek into the future’

Blog banner

Process Creation

Blog banner

10 Things To Do On Valentine's Day If You're Single

Blog banner

Blockchain Transactions

Blog banner

Interrupts

Blog banner

Health and fitness in technology

Blog banner

Disk cache

Blog banner

Hash password! Is it really secured?

Blog banner

Technical Challenges and Directions for Digital Forensics

Blog banner

Evolution of Operating Systems

Blog banner

THREADS (assignment 1)

Blog banner

Zomato (Income Sources)

Blog banner

Beauty of indian railway

Blog banner

Multicore CPUs

Blog banner

How covid-19 impacted Social media ad spend forecast globally

Blog banner

Expert System In AI

Blog banner

Can a Water Flosser Replace Manual Flossing? Here’s What Dentists Say

Blog banner

Why You Need 2FA (Two-Factor Authentication) On Your Email And Other Online Accounts

Blog banner