We will learn about Steganography; outcome- will know the basics and disadvantages of Steganography and understand the difference between cryptography and steganography.
Steganography
For cybersecurity-related issues for businesses, please visit https://www.benchmarkitservices.com/cyber-security/.
In steganography, we are not going to do encryption. Instead, we are going to conceal the existence of the message. That means we will hide the presence of news in other forms. So here, we are not going to encrypt the message instead, and we are going to hide the message. So as mentioned, this is not an encryption scheme may. Be any approach may be a substitution technique or a transposition technique whatsoever wherein steganography, we will not do encryption. So obviously, we are not going to get the ciphertext. Instead, we are going to hide the message.
Difference between Steganography and Cryptography
We know encryption is vital in cryptography, where cryptography renders the message unintelligible to outsiders. The encryption algorithms will convert the text to an unintelligible ciphertext. So if the outsider sees the incomprehensible message, the outsiders will not be able to understand what the news is.
For Data security-related issues of businesses, please visit https://www.benchmarkitservices.com/backup/.
So, it was evident that steganography is not cryptography because steganography will not do encryption. One simple steganographic technique now, just see here simply encrypt correct reading exactly twice this example has steganography method involved. Just visit this example and find their message, which is hidden here. There is a secret message which is hidden here. Let me show that now. Can you see underground the hidden confidential information? So the message is hidden in the 1st letter of every word taken, giving a readable text, personal text or a piece of secret information in this case. You can send your confidential message like this so that the outsiders will not know about what it is. They will simply see that there is a message, but they may not be aware that the first letter of every word will constitute the message which is the hidden information. So, there is a hidden message which is secret here.
Steganography Techniques
For general IT Support Services for Businesses, please visit https://www.benchmarkitservices.com.au.
Steganography has been used historically; there are many techniques that they used. Number one is the character marking process lets us take either a printed text or a typewritten text. In this text, the selected letters of either printed or typewritten text are overwritten in pencil. When you overwrite something on a pencil usually, this overwritten text will not be visible unless the paper is held at some angle to bright light. So, it hid messages on the printed text or typewritten text, but only the sender and receiver know at some specific angle only the overwritten text will be visible to bright light.
Let us see the second one, the invisible ink; it can use some chemicals or natural substances for writing text or information, which is secret information. Then this technique will leave no traces of the written text until some heat or chemical is applied to the paper. So, this is an invisible ink steganography technique.
Let us see the third technique: the pin punctures typically have small pink holes on selected letters or are not visible. The text will only be visible when the paper is held in front of her light. So, this is the pin puncture technique.
Let us see the 4th Steganography technique, which is the typewriter colour ribbon; they say there is a type of material, and typically there will be some spaces between the lines. Why will these places be there between the lines to improve reliability? Usually, this is used between lines with a black ribbon, and the results of typing with the correction table are visible only under a vital life. So, this is also a Steganography technique, but if you are not here, these are all steganography techniques that are applied historically. But what about computer systems or network security?
Steganography Drawbacks
Steganography can also be applied to the security aspects of computers and networks. Steganography can be used in computers as well, but this Steganography has some drawbacks. Let us see what they are,
Number one, a lot of overhead is involved in hiding their text because see if it is an encryption scheme where the encryption algorithm will be converting the plaintext into ciphertext with the help of a key. We are going to hide the information in some form, so that involves a lot of overhead. At the same time, any system becomes virtually worthless once it is discovered. It is not only with Steganography. Any secure method, if the key is located, the ciphertext is found, or the concept deployed for hiding the information is discovered, becomes worthless. However, still, we can deploy Steganography in a much more robust manner. We can first encrypt the message and then hide the message using steganography, so this will give better results when compared to either steganography or cryptography. So, we are combining both cryptography and steganography to provide better security.
To purchase any, IT related software or hardware, please visit: https://www.xtechbuy.com/