answersLogoWhite

0


Best Answer

Hiding messages in digital data. See http://en.wikipedia.org/wiki/Steganography which will help.

User Avatar

Wiki User

14y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: What is digital steganography?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

Why steganography is good with java?

Steganography is good with JAVA because JAVA is a highly secured language. If we use steganography with JAVA, it will enforce multiple levels of security of data. form: RISHU


Where is steganography used?

Stenography is when someone is ored


What is audio steganography?

Audio steganography means that the hide the information in that audio formate on the audio formate by using the LSB ,Echo,phase and spread spectrum coading. in these steganography method is most usefual and good method to hide the data in audio formate but one major disadvantage is if in audio steganography metod in processing data in that some intrupts are ocurred then input is not equal to output.


What are the advantages of using steganography technique with java?

The only real advantages of using Java for steganography is that it has built in support for reading and storing various image types (probably the most common medium used for steganography). Other than that, it's no more suitable than any other language than can read from and write to files.


What is steganography?

Steganography is hiding a message within something else, in such a way so that someone who doesn't know it is there will have trouble finding it. It is not considered to be as good as encryption, since it is not really hard to discover by people looking for it.


What is the comparison between stenography and cryptography in terms of gray level?

I think you mean "Steganography".


Difference bitween steganography and stegnography?

I think no same meaning , only spellings are different.


What kinds of products does WetStone offer?

WetStone Technologies offers various digital forensic and investigative software solutions. Their products include StegoSuite for steganography detection, Gargoyle for digital investigations, and Net (Triage) for network traffic analysis and monitoring.


Applications of fourier transforms in information technology?

Some uses are: Signals Analysis, DSP, cryptography, steganography, and image editing.


What is an example of social steganography?

An example of social steganography is encoding hidden messages within publicly shared images, such as using specific colors or patterns to convey information only understood by a select group of people. This practice allows individuals to communicate discreetly within a public forum without drawing attention to sensitive content.


What are the main problems of steganography?

The biggest problem steganography faces is that of size. There is a limit to the size of a file which you can embed information into. For instance if you take a 16 bit image where each pixel is 4 bytes in three colours RGB you can only reliable encode the lower byte before the colour changes become visible in the viewed image. This means that the image you are embedding your data in has to be 1 quarter larger than the encrypted data itself.


What are the advantages and disadvantages of steganography?

The obvious advantage of steganography is that you can hide a secret message in another message, be it text, image, audio, or whatever media you decide to hide your secret in. The main problem with this is that either you or the person you're sending the "secret" message to need to be able to find the message. And if you can find it, then the bad guys you want to keep the message a secret from can find it, too.