banner



What Is Steganography? What Are Some Ways That Steganography Can Be Used Within Applications?

  • Selected Reading
  • UPSC IAS Exams Notes
  • Developer's Best Practices
  • Questions and Answers
  • Effective Resume Writing
  • HR Interview Questions
  • Computer Glossary
  • Who is Who

What are the awarding of Steganography?


Steganography is also represented as the fine art and scientific discipline of hiding data by embedding letters within apparently harmless messages. Steganography works by restoring $.25 of useless or unused information in regular computer files. This hidden data can be plaintext or ciphertext and fifty-fifty images.

Steganography hides the covert message only not the fact that two parties are connecting with each other. The steganography process frequently includes locating a subconscious message in some send medium, known equally the carrier.

The secret message is embedded in the carrier to form the steganography channel. The demand of a steganography key tin be employed for encryption of the hidden message and for randomization in the steganography design.

At that place are various application of steganography which are as follows −

Digital Watermarking − Digital watermarking is the process of embedding information into a digital betoken in a way that is complex to delete. The point tin can be audio, pictures or video.

For case, if the signal is copied, and then the data is as well carried in the copy. A indicate can acquit several multiple watermarks at the same time.

Visible Watermarking − In this visible watermarking, the information is visible in the picture or video. Generally, the information is text or a logo which recognizes the owner of the media. When a goggle box broadcaster insert its logo to the corner of transmitted video, and this is likewise a visible watermark.

Invisible Watermarking − In this invisible watermarking, information is inserted as digital information to audio, picture or video, but it cannot be perceived equally such (although it tin can be possible to recognize that some amount of data is hidden).

The watermark can be pre-determined for extensive use and is therefore create simply to fetch or information technology can be a course of Steganography, where a party connects a hidden message installed in the digital signal.

In invisible watermarking, the goals is to connect ownership or other descriptive data to the point in an approach that is complex to remove. Information technology is also applicable to use subconscious embedded data as a means of covert connexion between individuals.

Digital Watermarking can exist used for a broad range of applications including Copyright protection Source Tracking (there are multiple recipients have differently watermarked content). The numbers of possible applications for digital watermarking technologies are developing very speedily.

For instance, in the field of data security, watermarks can exist used for certification, hallmark, and provisional approach. Certification is an important problem for official files, including identity cards or passports.

Digital watermarks are generated by transforming copyright information into manifestly random digital "noise" utilizing an algorithm that is imperceptible to all but special watermark reading application. So while a JPEG document that is read by an internet browser can display a skilful motion picture, that same file volition show the copyright when read past the watermark application.

raja

Published on 14-Mar-2022 07:14:06

  • Related Questions & Answers
  • What are the types of Steganography?
  • What are the requirement of Steganography?
  • What are the tools of Steganography?
  • What are the methods of Audio Steganography?
  • What are the characteristics of Steganography software?
  • What are the popular approaches of text steganography?
  • What are the reward and disadvantage of Steganography?
  • What are the techniques of Text Steganography in Information Security?
  • What are the methods of Image Steganography in Information Security?
  • What are the application of anomaly detection?
  • What are the application of Digital Watermarking?
  • What are the application of MD5 Algorithm?
  • What is the uses of Steganography?
  • What are Steganography in information security?
  • What is Audio Steganography?

What Is Steganography? What Are Some Ways That Steganography Can Be Used Within Applications?,

Source: https://www.tutorialspoint.com/what-are-the-application-of-steganography

Posted by: hutchinsonloulty.blogspot.com

0 Response to "What Is Steganography? What Are Some Ways That Steganography Can Be Used Within Applications?"

Post a Comment

Iklan Atas Artikel

Iklan Tengah Artikel 1

Iklan Tengah Artikel 2

Iklan Bawah Artikel