wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Steganography

profile
Abhishek Jaiswal
Aug 30, 2022
2 Likes
0 Discussions
90 Reads

The word Steganography is derived from two Greek words- ‘stegos’ meaning ‘to cover’ and ‘grayfia’, meaning ‘writing’, thus translating to ‘covered writing’, or ‘hidden writing’. Steganography is a method of hiding secret data, by embedding it into an audio, video, image, or text file. It is one of the methods employed to protect secret or sensitive data from malicious attacks. 

How is it different from cryptography? 

Cryptography and steganography are both methods used to hide or protect secret data. However, they differ in the respect that cryptography makes the data unreadable, or hides the meaning of the data, while steganography hides the existence of the data. 

In layman’s terms, cryptography is similar to writing a letter in a secret language: people can read it, but won’t understand what it means. However, the existence of a (probably secret) message would be obvious to anyone who sees the letter, and if someone either knows or figures out your secret language, then your message can easily be read. 

If you were to use steganography in the same situation, you would hide the letter inside a pair of socks that you would be gifting the intended recipient of the letter. To those who don’t know about the message, it would look like there was nothing more to your gift than the socks.

Different Types of Steganography : 

  • Text Steganography − There is steganography in text files, which entails secretly storing information. In this method, the hidden data is encoded into the letter of each word. 
  • Image Steganography − The second type of steganography is image steganography, which entails concealing data by using an image of a different object as a cover. 
  • Audio Steganography − It is the science of hiding data in sound. Used digitally, it protects against unauthorized reproduction. 
  • Video Steganography − Video steganography is a method of secretly embedding data or other files within a video file on a computer.  Video steganography typically employs the following file formats: H.264, MP4, MPEG, and AVI.
  • Network or Protocol Steganography − It involves concealing data by using a network protocol like TCP, UDP, ICMP, IP, etc., as a cover object. 
  • White Space Steganography -  It is a technique to hide information in a text file using extra blank space inserted in between words covering file.

Tools to perform steganography : 

  • OpenStego
  • QuickStego
  • Hide’N’Send
  • Our Secret
  • Image Steganography

 

 

 


Comments ()


Sign in

Read Next

How Does SSO Works

Blog banner

TECHNOLOGY : BOON OR CURSE ?

Blog banner

The Role of Frontline Managers in Driving Workplace Performance and Customer Satisfaction

Blog banner

Computer Forensics and its Impact in Business Environment

Blog banner

Fault Tolerance

Blog banner

Koinex is shutting down and here is how you can withdraw...

Blog banner

Password Generator - Lisp

Blog banner

Dangers of Using Public WiFis

Blog banner

Internet of Things

Blog banner

Tea, Coffee, Red Wine, and Teeth: A Stain Survival Guide

Blog banner

Interrupts - Types, Working & Importance

Blog banner

Topic: Sessions in Operating system

Blog banner

Direct memory access (DMA)

Blog banner

BENIFITS OF YOGA

Blog banner

A Heartfelt Act of Kindness

Blog banner

AN EVENT-BASED DIGITAL FORENSIC INVESTIGATION

Blog banner

Dekkers Algorithm : Ensuring Safe Process Synchronization

Blog banner

Travel Geek ‘The last $50k in Switzerland’

Blog banner

Working with Sniffers for monitoring network communication

Blog banner

The Peephole

Blog banner

Article on team management software

Blog banner

Cache Memory

Blog banner

Deadlock

Blog banner

Operating system

Blog banner

Dudhasagar waterfall ?

Blog banner

Service Strategy In ITSM

Blog banner

Junk food vs healthy food

Blog banner

Zomato's Secret Digital Marketing Techniques!

Blog banner

Linker

Blog banner

Who decides your overthinking, anyway?

Blog banner

MACHINE LEARNING

Blog banner

Optimization of operating system design

Blog banner

ProofHub

Blog banner

Introduction to GIS

Blog banner

“Shot on iPhone” : A campaign by Apple that turned into a prodigy

Blog banner

Understanding Endometriosis and Its Psychological Impact on Quality of Life

Blog banner

Real-Time Operating Systems (RTOS) Deep Explanation

Blog banner

OLA

Blog banner

FASHION

Blog banner

Computer Security

Blog banner

ahh wait a min

Blog banner

Types of Malware in Cyber Security

Blog banner