Steganography and Cryptography

 

Steganography And Cryptography

 

Steganography

 

Steganography, or cover writing, is a method wherein a secret message is transformed into faux looking message. This method facilitates to preserve a message mystery. it's miles pretty tough to apply and recognize. structure of statistics stays unaltered in Steganography.

Steganography is a technique wherein mystery message is hidden in a cover media. Steganography method blanketed writing. Steganography is the idea to prevent mystery facts with the aid of developing the suspicion. Steganography is less popular than Cryptography. In steganography, shape of information isn't commonly altered.

The forms are:

1. Text
2. Audio
3. Video
4. Images
5. Network or Protocol

 

Cryptography

 

Cryptography or secret writing, is a method where a secret method is converted in cipher text and sent to other person who then decrypt the cipher text into plain text.

Cryptography method mystery writing. In cryptography, sender does not send message directly to the receiver, before sending records to the receiver information or simple textual content is converted into cipher textual content by using the usage of a few encryption algorithm then send to the receiver and receiver decrypt the cipher text into simple textual content to study the authentic information.

It's types:

1. Symmetric key cryptography

2. Asymmetric key cryptography

 

In steganography let’s learn more about image Image Steganography.

 

Image Steganography – 


as the call indicates, picture Steganography refers to the manner of hiding data inside an photo file. The photograph decided on for this cause is referred to as the cover photograph and the image obtained after steganography is known as the stego image.

 

How is it done? 


An image is represented as an N*M (in case of greyscale images) or N*M*3 (in case of color images) matrix in memory, with every access representing the intensity price of a pixel. In image steganography, a message is embedded into an photo via changing the values of a few pixels, which might be selected through an encryption set of rules. The recipient of the photograph must be privy to the identical algorithm for you to recognize which pixels she or he should pick to extract the message.



 

Cryptography

 

Cryptography is assessed into symmetric cryptography and asymmetric cryptography. beneath are the description of those kinds.

 

1.    Symmetric key cryptography – It includes the usage of one mystery key at the side of encryption and decryption algorithms which help in securing the contents of the message. The power of symmetric key cryptography relies upon upon the range of key bits. it's far especially faster than asymmetric key cryptography. There arises a key distribution trouble as the key must be transferred from the sender to the receiver through a comfy channel. 


2. Asymmetric key cryptography: it's also referred to as public-key cryptography because it entails the usage of a public key at the side of the secret key. It solves the trouble of key distribution as each parties use specific keys for encryption/decryption. It isn't always viable to use for decrypting bulk messages as it's far very gradual in comparison to symmetric key cryptography.




 '





How is Steganography different from cryptography? 


Cryptography and steganography are each methods used to hide or defend secret information. however, they vary inside the respect that cryptography makes the information unreadable, or hides the meaning of the statistics, while steganography hides the existence of the statistics.

In layman’s phrases, cryptography is much like writing a letter in a secret language: people can study it, however won’t understand what it way. but, the lifestyles of a (probable secret) message might be obvious to anyone who sees the letter, and if someone either is aware of or figures out your mystery language, then your message can easily be read.

if you were to use steganography in the same state of affairs, you would cover the letter interior a couple of socks which you would be gifting the supposed recipient of the letter. To people who don’t realize approximately the message, it might appear like there was not anything more on your present than the socks. however the supposed recipient is aware of what to search for, and unearths the message hidden in them.

in addition, if two customers exchanged media files over the net, it might be more difficult to decide whether these documents include hidden messages than if they have been speaking using cryptography.

Cryptography is frequently used to supplement the safety provided by steganography. Cryptography algorithms are used to encrypt mystery information before embedding it into cover documents.


The difference between Steganography and Cryptography:

 

Steganography

 

Cryptography

Steganography means covered writing.

         

Cryptography means secret writing.

Steganography is less famous than Cryptography.      

         

while cryptography is more famous than Steganography.

 

assault’s call in Steganography is Steganalysis.

at the same time as in cryptography, assault’s name is Cryptanalysis.

In steganography, structure of statistics isn't always generally altered.                  

even as in cryptography, shape of information is altered.

Steganography supports Confidentiality and Authentication safety standards.

at the same time as cryptography helps Confidentiality and Authentication safety ideas in addition to facts integrity and Non-repudiation.

In steganography, the truth that a mystery verbal exchange is taking location is hidden.          

while in cryptography most effective mystery message is hidden.

In steganography, now not a good deal mathematical alterations are involved.              

Cryptography involves using number theory, mathematics etc. to modify statistics

 

Applications of Steganography

 

·       Confidential communication and secret data storing

·       Protection of data alteration

·       Access control system for digital content distribution

·       Media Database systems

 

Applications of Cryptography

 

·       Authentication/Digital Signatures

·       Time Stamping

·       Electronic Money

·       Secure Network Communications

·       Anonymous Remailers

 

Conclusion

 

When steganography is employed alone, it is security by obscurity, which might result in the secret message being disclosed. Combining steganography and cryptography is the greatest way to disguise a message from adversaries while still protecting it in case it is detected.

Comments