steganography


Also found in: Thesaurus, Medical, Acronyms, Encyclopedia, Wikipedia.

steg·a·nog·ra·phy

 (stĕg′ə-nŏg′rə-fē)
n.
The deliberate concealment of data within other data, as by embedding digitized text in a digitized image.

[New Latin steganographia, cryptography, cipher : Greek steganos, covered (from stegein, to cover; see (s)teg- in Indo-European roots) + -graphiā, -graphy.]

steg′a·no·graph′ic (-nə-grăf′ĭk) adj.

steganography

(ˌstɛɡəˈnɒɡrəfɪ)
n
the practice of concealing messages in such a way that only the sender and the recipient know that there is a message

steganography

Archaic. the use of a secret language or code; cryptography. — steganographer, n.
See also: Language
ThesaurusAntonymsRelated WordsSynonymsLegend:
Noun1.steganography - act of writing in code or cipher
committal to writing, writing - the activity of putting something in written form; "she did the thinking while he did the writing"
encoding, encryption - the activity of converting data or information into code
recoding - converting from one code to another
decipherment, decoding, decryption - the activity of making clear or converting from code into plain text; "a secret key or password is required for decryption"
Translations
SteganografieSteganographie
steganografia
steganografia
steganografie
steganografia
References in periodicals archive ?
The malware in some cases was hidden in text, and later in an image -- a technique known as steganography, according to McAfee.
While encryption provides good confidentiality, there is another way to provide confidentiality know as steganography.
The some types of data hiding approaches are Watermarking, Steganography and Reversible Data Hiding (RDH).
Kaspersky Lab researchers identified a new trend: malicious hackers increasingly using steganography, a digital version of an ancient technique of hiding messages inside images, to conceal the tracks of their activity.
Reverse Deception Tactics Increasing cybercriminal use of deception tactics including anti-analysis code, steganography, and expendable command-and-control servers used for concealment of stolen data.
Keywords: Least significant bit replacement, Image hiding, Pixel-value differencing, Steganography, Data hiding.
Steganography cyberattacks were first spotted in 2011 as a means to spread the Duqu malware - an attack that was once (http://resources.
by malware authors, which included the use of steganography, a practice of
The seventeen selections that make up the main body of the text are devoted to fuzzy approaches and analysis in image processing, text information extraction from images, exploring imaging and video steganography based on DCT and wavelet transform, and a wide variety of other related subjects.
This is the first time when the use of steganography has been observed in a malvertising attack, according to Proofpoint.