What Are the Different Types of Steganography Tools?
Steganography is a technique and science about information hiding. The so-called information hiding refers to the transmission of information or the content of information so that no one except the intended recipient is aware of it. Steganography is called Steganography in English. It is derived from Steganographia, a book about cryptography and steganography by Tritmius .
- In general, steganographic information looks like something else, such as a shopping list, an article, a picture, or other "cover" messages.
- Steganography is usually done using some traditional methods
- First of all, in the overview of steganography, we must mention its close brother electronic watermarking (watermarking), which is used to identify the authenticity of the item (for example: the New Taiwan dollar is faintly visible on the plum blossom, the RMB is the faintly visible Mao Zedong head) Either as a sign of a copyright statement, or by including information about the properties of the work. Electronic watermarking and steganography have the same point in that they both steer one file into another, and the difference between the two lies in the use purpose and processing algorithm. Electronic steganography focuses on hiding secret files, while electronic watermarking pays more attention to the declaration and maintenance of copyrights, to prevent multimedia works from being illegally copied, and so on. Once the electronic steganography is detected, the secret file is very easy to read. On the contrary, the electronic watermark does not hide and conceal the hidden nature of the file, but cares about the attack of the Robustness removal algorithm. [1]
- The size of the cover file relative to the covert file
- In recent years, the field of steganography has become
- Many steganography algorithms have been developed as steganography tools. Johnson compiled the software and listed more than 100 software. The table lists some of the common image steganography software.
|
|
|
|
|
|
| - |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|