steganography

(redirected from stego)
Also found in: Thesaurus, Encyclopedia.

steg·a·nog·ra·phy

 (stĕg′ə-nŏg′rə-fē)
n.
The deliberate concealment of data within other data, as by embedding digitized text in a digitized image.

[New Latin steganographia, cryptography, cipher : Greek steganos, covered (from stegein, to cover; see (s)teg- in Indo-European roots) + -graphiā, -graphy.]

steg′a·no·graph′ic (-nə-grăf′ĭk) adj.

steganography

(ˌstɛɡəˈnɒɡrəfɪ)
n
the practice of concealing messages in such a way that only the sender and the recipient know that there is a message

steganography

Archaic. the use of a secret language or code; cryptography. — steganographer, n.
See also: Language
ThesaurusAntonymsRelated WordsSynonymsLegend:
Noun1.steganography - act of writing in code or cipher
committal to writing, writing - the activity of putting something in written form; "she did the thinking while he did the writing"
encoding, encryption - the activity of converting data or information into code
recoding - converting from one code to another
decipherment, decoding, decryption - the activity of making clear or converting from code into plain text; "a secret key or password is required for decryption"
Translations
SteganografieSteganographie
steganografia
steganografia
steganografie
steganografia
References in periodicals archive ?
As the adversary of digital steganography, steganalysis [1] focuses on developing methods for detecting the presence of secret messages, estimating the message length, locating stego positions, extracting messages, etc.
Then, the stego image is crested and transmitted over the network.
The quality of stego image was enhanced by residual image coding (RIC).
Computer scientists and engineers deal with different aspects of cyber-security, among them a new view of privacy in social networks: strengthening privacy during propagation, audio stego intrusion detection system through a hybrid neural tree model, security issues and countermeasures of online transactions in electronic commerce, provable security for public key crypto-systems: how to prove that the crypto-system is secure, and applying face recognition techniques in video for biometric security: a review of basic methods and emerging trends.
Stego transformation of spatial domain of cover image robust against attacks on embedded message.
Cuando este procedimiento se realiza con imagenes, la informacion secreta se inserta dentro de la imagen huesped, obteniendo como resultado una nueva imagen conocida como imagen stego [5].
However, steganography is said to be secure if the existence of the information/data hidden in the cover image is undetectable, meaning an individual cannot distinguish the difference between the original cover image and final embedded stego image.
In their scheme, the shares are camouflaged in a cover image to form the stego images, which cannot be distinguished by the human eye, so these shares can be concealed from intruders.
The result shows that the AMELSBR method is able to manage for hiding and restoring files without causing excessive distortion (noise) in stego image, and has a possibility of returning most files for image manipulation such as the change of image brightness and contrast for the black and white color dominan.
He established his own business, Stego Systems, Inc.
For example, early on with Stego Industries, LLC, I called a meeting, identified an issue legal in nature, proposed a solution, and received the approval to execute that solution.