Steganography and Cryptography
Steganography And Cryptography
Steganography
Steganography, or cover writing, is a method
wherein a secret message is transformed into faux looking message. This method
facilitates to preserve a message mystery. it's miles pretty tough to apply and
recognize. structure of statistics stays unaltered in Steganography.
Steganography is a
technique wherein mystery message is hidden in a cover media. Steganography
method blanketed writing. Steganography is the idea to prevent mystery facts
with the aid of developing the suspicion. Steganography is less popular than
Cryptography. In steganography, shape of information isn't commonly altered.
The forms are:
1. Text2. Audio3. Video4. Images5. Network or Protocol
Cryptography
Cryptography or secret
writing, is a method where a secret method is converted in cipher text and sent
to other person who then decrypt the cipher text into plain text.
Cryptography
method mystery writing. In cryptography, sender does not send message directly
to the receiver, before sending records to the receiver information or simple
textual content is converted into cipher textual content by using the usage of
a few encryption algorithm then send to the receiver and receiver decrypt the
cipher text into simple textual content to study the authentic information.
It's types:
1. Symmetric key cryptography
2. Asymmetric key cryptography
In steganography let’s learn
more about image Image
Steganography.
Image Steganography –
as the call indicates, picture Steganography
refers to the manner of hiding data inside an photo file. The photograph
decided on for this cause is referred to as the cover photograph and the image
obtained after steganography is known as the stego image.
How is it done?
An image is represented as an N*M (in case of
greyscale images) or N*M*3 (in case of color images) matrix in memory, with
every access representing the intensity price of a pixel. In image
steganography, a message is embedded into an photo via changing the values of a
few pixels, which might be selected through an encryption set of rules. The
recipient of the photograph must be privy to the identical algorithm for you to
recognize which pixels she or he should pick to extract the message.
Cryptography
Cryptography
is assessed into symmetric cryptography and asymmetric cryptography. beneath
are the description of those kinds.
1. Symmetric key cryptography – It includes the usage of one mystery key at the side of encryption and decryption algorithms which help in securing the contents of the message. The power of symmetric key cryptography relies upon upon the range of key bits. it's far especially faster than asymmetric key cryptography. There arises a key distribution trouble as the key must be transferred from the sender to the receiver through a comfy channel.
2. Asymmetric key cryptography: it's also referred to as public-key cryptography because it entails the usage of a public key at the side of the secret key. It solves the trouble of key distribution as each parties use specific keys for encryption/decryption. It isn't always viable to use for decrypting bulk messages as it's far very gradual in comparison to symmetric key cryptography.
'
How is Steganography different from cryptography?
Cryptography and steganography are each methods used to hide or defend secret
information. however, they vary inside the respect that cryptography makes the
information unreadable, or hides the meaning of the statistics, while
steganography hides the existence of the statistics.
In
layman’s phrases, cryptography is much like writing a letter in a secret
language: people can study it, however won’t understand what it way. but, the
lifestyles of a (probable secret) message might be obvious to anyone who sees
the letter, and if someone either is aware of or figures out your mystery
language, then your message can easily be read.
if you
were to use steganography in the same state of affairs, you would cover the
letter interior a couple of socks which you would be gifting the supposed
recipient of the letter. To people who don’t realize approximately the message,
it might appear like there was not anything more on your present than the
socks. however the supposed recipient is aware of what to search for, and
unearths the message hidden in them.
in
addition, if two customers exchanged media files over the net, it might be more
difficult to decide whether these documents include hidden messages than if
they have been speaking using cryptography.
Cryptography is
frequently used to supplement the safety provided by steganography.
Cryptography algorithms are used to encrypt mystery information before
embedding it into cover documents.
The difference between Steganography and Cryptography:
|
Steganography
|
Cryptography |
|
Steganography means covered writing. |
Cryptography means secret writing. |
|
Steganography is less famous than
Cryptography. |
while cryptography is more famous than
Steganography.
|
|
assault’s call in Steganography is Steganalysis. |
at the same time as in cryptography,
assault’s name is Cryptanalysis. |
|
In steganography, structure of statistics
isn't always generally altered. |
even as in cryptography, shape of
information is altered. |
|
Steganography supports Confidentiality and
Authentication safety standards. |
at the same time as cryptography helps
Confidentiality and Authentication safety ideas in addition to facts
integrity and Non-repudiation. |
|
In steganography, the truth that a mystery
verbal exchange is taking location is hidden. |
while in cryptography most effective
mystery message is hidden. |
|
In steganography, now not a good deal
mathematical alterations are involved. |
Cryptography involves using number theory,
mathematics etc. to modify statistics |
Applications of Steganography
·
Confidential
communication and secret data storing
·
Protection
of data alteration
·
Access
control system for digital content distribution
·
Media
Database systems
Applications of Cryptography
·
Authentication/Digital
Signatures
·
Time
Stamping
·
Electronic
Money
·
Secure
Network Communications
·
Anonymous
Remailers
Conclusion
When steganography is employed alone, it is security by obscurity, which might result in the secret message being disclosed. Combining steganography and cryptography is the greatest way to disguise a message from adversaries while still protecting it in case it is detected.
Comments
Post a Comment