steganography


Also found in: Thesaurus, Medical, Acronyms, Encyclopedia, Wikipedia.

steg·a·nog·ra·phy

 (stĕg′ə-nŏg′rə-fē)
n.
The deliberate concealment of data within other data, as by embedding digitized text in a digitized image.

[New Latin steganographia, cryptography, cipher : Greek steganos, covered (from stegein, to cover; see (s)teg- in Indo-European roots) + -graphiā, -graphy.]

steg′a·no·graph′ic (-nə-grăf′ĭk) adj.

steganography

(ˌstɛɡəˈnɒɡrəfɪ)
n
the practice of concealing messages in such a way that only the sender and the recipient know that there is a message

steganography

Archaic. the use of a secret language or code; cryptography. — steganographer, n.
See also: Language
ThesaurusAntonymsRelated WordsSynonymsLegend:
Noun1.steganography - act of writing in code or cipher
committal to writing, writing - the activity of putting something in written form; "she did the thinking while he did the writing"
encoding, encryption - the activity of converting data or information into code
recoding - converting from one code to another
decipherment, decoding, decryption - the activity of making clear or converting from code into plain text; "a secret key or password is required for decryption"
Translations
SteganografieSteganographie
steganografia
steganografia
steganografie
steganografia
References in periodicals archive ?
The project lies in the area of steganography. Here one party wishes to hide (embed) information in an apparently innocent cover, by making small changes, and their opponent wishes to detect whether information has been hidden.
For the activity to remain unseen for such a long time, the group encoded its information using a technique called steganography, which conceals the fact that there is any information there at all.
To encrypt an image, techniques like visual cryptography (VC) [1], steganography [2], watermarking [3], deep learning based ones [23, 24], chaotic system and symmetric/asymmetric cryptosystem based ones [16, 17] etc.
Therefore, data hidingtechniques using steganography algorithms are taking place, since it covers the e [x.sub.i] stence of data transmission.
During the forum Help AG's white hat hackers will conduct a live hacking session on the latest trend of fileless attacks, demonstrating how technologies such as steganography and undetectable encoding tools are proving difficult to detect even for next-generation endpoint security solutions.
This paper proposes a method for iris template security using steganography technique.
Network steganography is the art of hiding secret data in legitimate transmissions in communication networks without destroying the used hidden data carrier [1].
Data security has been divided into many different areas and disciplines such as cryptography, secret sharing, watermarking, and steganography.
Or a patron surfing the web may innocently click on an email attachment that contains a virus or a media file (such as a photo or video) that is embedded with nasty code, as Felicia Smith (a librarian and former criminal investigator) describes in her article about malicious steganography and other risks associated with Al-based technology.
For this type of communication, steganography is the alternative solution to cryptography (Singh & Chawla, 2014).
Steganography is a skill of hiding a message over a communication channel or link, so that the secret message is deliberately latent among other irrelevant observed information which will result in hiding the presence of communication, and is based on the use of the spaces of the information carriers which does not damage the carrier's identity.
The malware in some cases was hidden in text, and later in an image -- a technique known as steganography, according to McAfee.