wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Steganography

profile
Abhishek Jaiswal
Aug 30, 2022
2 Likes
0 Discussions
90 Reads

The word Steganography is derived from two Greek words- ‘stegos’ meaning ‘to cover’ and ‘grayfia’, meaning ‘writing’, thus translating to ‘covered writing’, or ‘hidden writing’. Steganography is a method of hiding secret data, by embedding it into an audio, video, image, or text file. It is one of the methods employed to protect secret or sensitive data from malicious attacks. 

How is it different from cryptography? 

Cryptography and steganography are both methods used to hide or protect secret data. However, they differ in the respect that cryptography makes the data unreadable, or hides the meaning of the data, while steganography hides the existence of the data. 

In layman’s terms, cryptography is similar to writing a letter in a secret language: people can read it, but won’t understand what it means. However, the existence of a (probably secret) message would be obvious to anyone who sees the letter, and if someone either knows or figures out your secret language, then your message can easily be read. 

If you were to use steganography in the same situation, you would hide the letter inside a pair of socks that you would be gifting the intended recipient of the letter. To those who don’t know about the message, it would look like there was nothing more to your gift than the socks.

Different Types of Steganography : 

  • Text Steganography − There is steganography in text files, which entails secretly storing information. In this method, the hidden data is encoded into the letter of each word. 
  • Image Steganography − The second type of steganography is image steganography, which entails concealing data by using an image of a different object as a cover. 
  • Audio Steganography − It is the science of hiding data in sound. Used digitally, it protects against unauthorized reproduction. 
  • Video Steganography − Video steganography is a method of secretly embedding data or other files within a video file on a computer.  Video steganography typically employs the following file formats: H.264, MP4, MPEG, and AVI.
  • Network or Protocol Steganography − It involves concealing data by using a network protocol like TCP, UDP, ICMP, IP, etc., as a cover object. 
  • White Space Steganography -  It is a technique to hide information in a text file using extra blank space inserted in between words covering file.

Tools to perform steganography : 

  • OpenStego
  • QuickStego
  • Hide’N’Send
  • Our Secret
  • Image Steganography

 

 

 


Comments ()


Sign in

Read Next

FASHION

Blog banner

INDIAN CHEAPEST COSMETICS BRAND

Blog banner

QUANTUM COMPUTING IN SECURITY:A GAME CHANGER IN DIGITAL WORLD

Blog banner

It's all about our Brain.- The Brain Metaphor

Blog banner

10 Interesting Facts about Death Note

Blog banner

Worms, viruses and Bots

Blog banner

Data Science in Mental Health Prediction

Blog banner

Business-to-Business

Blog banner

Understanding - Proof of Work!

Blog banner

What is Data, Information and Knowledge?

Blog banner

Buffer overflow

Blog banner

What is HTML?

Blog banner

Evolution of Operating system

Blog banner

Virus

Blog banner

Dal Bafla Recipe

Blog banner

Define Instagram.

Blog banner

Skills An Ethical Hacker Must Have

Blog banner

How To Invest in Indian Stock Market For Beginners. ~ Tutorial 2 (NSDL And CSDL) Continued...

Blog banner

File management In Operating System

Blog banner

10 Interesting Facts about Attack on Titan

Blog banner

MODERN OPERATING SYSTEM

Blog banner

Memory Management

Blog banner

Blockchain uses and use cases

Blog banner

Memory management

Blog banner

Multicore CPUs

Blog banner

Threads

Blog banner

Memory Management

Blog banner

Deadlock

Blog banner

Data Science in Healthcare: Predicting Diseases

Blog banner

GIS in Mapping and landslide alert in Bangladesh

Blog banner

Riddhi Miyani 53003220140

Blog banner

Shoulders

Blog banner

Deadlock and Starvation

Blog banner

Raid

Blog banner

Importance of Network Security Risk

Blog banner

What is Internet

Blog banner

Service Operations in ITSM

Blog banner

A Deep Dive

Blog banner

10 Problems you face if you are an Otaku

Blog banner

THE ROLE OF CYBER FORENSICS IN CRIMINOLOGY

Blog banner

Starvation and Deadlock.

Blog banner

MOBILE DEVICE FORENSIC

Blog banner