Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Windows 10 End of Service: What Must Be Done

    19 March 2025

    Elementor #7217

    5 March 2025

    Why Windows is Still the Best for Gamers: A Deep Dive

    27 February 2025
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram Vimeo
    Let's Tech It Easy
    Subscribe Login
    • Homepage
    • About
    • Blog
      • Computers
      • Cloud
      • Gaming
      • Cyber Security
      • iPhone
      • Mac
      • Windows
      • Android
    • Contact
    • My Tickets
    • Submit Ticket
    Let's Tech It Easy
    Home»Cloud»Steganography
    Cloud

    Steganography

    ltieintern4By ltieintern418 November 2021Updated:29 August 2022No Comments5 Mins Read
    Facebook Twitter Pinterest LinkedIn Tumblr WhatsApp VKontakte Email
    Share
    Facebook Twitter LinkedIn Pinterest Email

    We will learn about Steganography; outcome- will know the basics and disadvantages of Steganography and understand the difference between cryptography and steganography.

    Steganography

    Image Source

    For cybersecurity-related issues for businesses, please visit https://www.benchmarkitservices.com/cyber-security/.

    In steganography, we are not going to do encryption. Instead, we are going to conceal the existence of the message. That means we will hide the presence of news in other forms. So here, we are not going to encrypt the message instead, and we are going to hide the message. So as mentioned, this is not an encryption scheme may. Be any approach may be a substitution technique or a transposition technique whatsoever wherein steganography, we will not do encryption. So obviously, we are not going to get the ciphertext. Instead, we are going to hide the message.

    Difference between Steganography and Cryptography

    We know encryption is vital in cryptography, where cryptography renders the message unintelligible to outsiders. The encryption algorithms will convert the text to an unintelligible ciphertext. So if the outsider sees the incomprehensible message, the outsiders will not be able to understand what the news is.

    Image Source

    For Data security-related issues of businesses, please visit https://www.benchmarkitservices.com/backup/.

    So, it was evident that steganography is not cryptography because steganography will not do encryption. One simple steganographic technique now, just see here simply encrypt correct reading exactly twice this example has steganography method involved. Just visit this example and find their message, which is hidden here. There is a secret message which is hidden here. Let me show that now. Can you see underground the hidden confidential information? So the message is hidden in the 1st letter of every word taken, giving a readable text, personal text or a piece of secret information in this case. You can send your confidential message like this so that the outsiders will not know about what it is. They will simply see that there is a message, but they may not be aware that the first letter of every word will constitute the message which is the hidden information. So, there is a hidden message which is secret here.

    Steganography Techniques

    Image Source

    For general IT Support Services for Businesses, please visit https://www.benchmarkitservices.com.au.

    Steganography has been used historically; there are many techniques that they used. Number one is the character marking process lets us take either a printed text or a typewritten text. In this text, the selected letters of either printed or typewritten text are overwritten in pencil. When you overwrite something on a pencil usually, this overwritten text will not be visible unless the paper is held at some angle to bright light. So, it hid messages on the printed text or typewritten text, but only the sender and receiver know at some specific angle only the overwritten text will be visible to bright light.

    Let us see the second one, the invisible ink; it can use some chemicals or natural substances for writing text or information, which is secret information. Then this technique will leave no traces of the written text until some heat or chemical is applied to the paper. So, this is an invisible ink steganography technique.

    Image Source

    Let us see the third technique: the pin punctures typically have small pink holes on selected letters or are not visible. The text will only be visible when the paper is held in front of her light. So, this is the pin puncture technique.

    Let us see the 4th Steganography technique, which is the typewriter colour ribbon; they say there is a type of material, and typically there will be some spaces between the lines. Why will these places be there between the lines to improve reliability? Usually, this is used between lines with a black ribbon, and the results of typing with the correction table are visible only under a vital life. So, this is also a Steganography technique, but if you are not here, these are all steganography techniques that are applied historically. But what about computer systems or network security?

    Steganography Drawbacks

    Steganography can also be applied to the security aspects of computers and networks. Steganography can be used in computers as well, but this Steganography has some drawbacks. Let us see what they are,

    Number one, a lot of overhead is involved in hiding their text because see if it is an encryption scheme where the encryption algorithm will be converting the plaintext into ciphertext with the help of a key. We are going to hide the information in some form, so that involves a lot of overhead. At the same time, any system becomes virtually worthless once it is discovered. It is not only with Steganography. Any secure method, if the key is located, the ciphertext is found, or the concept deployed for hiding the information is discovered, becomes worthless. However, still, we can deploy Steganography in a much more robust manner. We can first encrypt the message and then hide the message using steganography, so this will give better results when compared to either steganography or cryptography. So, we are combining both cryptography and steganography to provide better security.

    To purchase any, IT related software or hardware, please visit: https://www.xtechbuy.com/

    Cryptography Steganography Steganography Techniques
    Share. Facebook Twitter Pinterest LinkedIn Tumblr WhatsApp Email
    Previous ArticleFramework of Cyber Security
    Next Article Types of OLAP Cubes and Operations
    ltieintern4

    Related Posts

    Windows 10 End of Service: What Must Be Done

    19 March 2025

    Elementor #7217

    5 March 2025

    Why Windows is Still the Best for Gamers: A Deep Dive

    27 February 2025

    Accessing a Windows External Hard Drive on Mac

    26 February 2025
    Leave A Reply Cancel Reply

    This site uses Akismet to reduce spam. Learn how your comment data is processed.

    Demo
    Our Picks
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo
    Don't Miss
    Business

    Windows 10 End of Service: What Must Be Done

    By Uneeb19 March 20250

    On October 14, 2025, Microsoft will officially end support for Windows 10, signalling a major shift…

    Elementor #7217

    5 March 2025

    Why Windows is Still the Best for Gamers: A Deep Dive

    27 February 2025

    Accessing a Windows External Hard Drive on Mac

    26 February 2025

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    You too can join us

    If you also think about technology and want to contribute either as a mentor or even from a learner’s perspective, look no further and join us. Write us at info@letstechiteasy.com and share your opinion. Our team will get back by sending you an invite to join the platform as a contributor. Empower others, empower yourself so each one of us can play with the technology safely one day without being scared.

    Subscribe Here
    Loading
    For Partnership Worldwide

    Contact:

    partner@letstechiteasy.com

     

    About Us
    About Us

    “Let’s Tech It Easy” or popularly known as “LTIE” is the blogging platform for everyone who wants to share and learn about technology. It is an initiative by the serial techpreneur Vish when he realized the wide gap between the pace at which the technology is evolving and at which it is getting adopted by a wider audience.

    Email Us: support@benchmarkitservices.com

    Latest Posts

    Upgrading RAM

    10 March 2023

    Desktop Vs Laptop

    10 March 2023

    Data Recovery

    3 March 2023

    MacOS on Windows Virtual Box

    10 February 2023

    macOS Monterey and what’s new in it?

    12 April 2022
    New Comments
    • How to Troubleshoot Sound and Mic on Windows 10 - Let's Tech It Easy on How to Access Troubleshooters on Windows 10
    • How to Stay Safe While Using Public Wi-Fi Networks - Let's Tech It Easy on Internet Security for Home Users – VPN 101
    • How to Set up Oracle VirtualBox on a Mac - Let's Tech It Easy on How to Install Windows 10 on a Mac Using Boot Camp Assistant
    • DoS Attack Implementation and Prevention in Ubuntu – Let's Tech It Easy on Top Kali Linux Commands
    Facebook X (Twitter) Instagram Pinterest
    • Homepage
    • About
    • Blog
    • Contact
    • Computers
    • Cloud
    • Gaming
    • Cyber Security
    • iPhone
    • Mac
    • Windows
    • My Tickets
    • Submit Ticket
    © 2025 LetsTechitEasy. Designed by Sukrit Infotech.

    Type above and press Enter to search. Press Esc to cancel.

    Sign In or Register

    Welcome Back!

    Login below or Register Now.

    Lost password?

    Register Now!

    Already registered? Login.

    A password will be e-mailed to you.