The negative side of the secrecy hiding technique: Steganography

Through the title many of us doesn’t hear the term but some of us heard the term but can’t know what it is used for. Once you read this article you will definitively find the answer to your questions. In this one, some of them know the full details about it, for those who know about this one, are the exceptional cases ok. Let’s move on, this steganography is also one of the security concepts and invented to maintain the secrecy of the content, it can be widely used for many years. At the same time, it will also place a vital role in our daily life. What is uses in our daily life but I don’t know about it? How is it possible?

It’s possible, in the technical fled. Because in many of the technology we are used is unaware of us. We use those to make our life easier but we can’t pay any attention to how they work and which technology it is based. Same like that it is also used by all smartphone users but they can’t be aware of it. I think the following real-life example will definitely help you to understand it better.

Have you ever used the QR code in your day?

What a stupid question is this? All of us used this one while making payments, learning, etc.

OK, you are all know about it. Now the next question, have ever think about how it works?

No, I think the code contains some information about what we need.

Yes, you are right. The QR code contains the information that we need. But how is it possible? While we looking at the code it simply looks like square boxes. But each of those holds the details about the content we searched for. And this one is possible through the steganography technique. I think now you have some basic idea about the concept. But once you read the full article you will definitely understand the concept thoroughly.

Ok as the blog rules first we have to look at the definition part, steganography is nothing but the process of hiding information into another piece of information like text, image, audio, or video clips. Here I remember one thing that is invisible ink. We have all seen this one in many movies did you believe it is also one of the steganography techniques.

Here most of we have one doubt that it is one of the oldest technologies why did you choose this one for today’s article and what is the negative side? I think it is a very useful one even it has a negative side then what is it?

Wait!! The answer for this one will be very clear once you read this one fully. So the definition part is over, let’s move on to the working process.

Well in the world of cybersecurity, steganography is the technique of hiding secret data within a non-secret, ordinary file or message to avoid being detected. The art and science of steganography is masking (hiding) information by embedding messages within something that may seem harmless. The most popular way of hiding is to hide the content into the least significant bit (LSB) of the concealing medium, so once the data is hidden then the appropriate receiver will read the message others are only seen the visible medium.

Here some of you think that then cryptography and steganography are the same?

No, definitely not. In cryptography, we use the secret keys for encrypting and decrypting the information if they know the key, then they will easily encrypt the content whereas steganography is a form of data hiding and can be executed in cleverer ways. Where cryptography is the science that largely enables privacy – steganography is a practice that enables secrecy – and deceit.

Now you are all have the idea about the major things of the steganography technique. The only unanswered question here is why I choose this one and what is the negative side of steganography? Both will be answered as follows:

I think you all read our previous article, Phishing right. If you do not, then use the following link. 

PLEASE READ: Phishing: The Beginners Guide

In that one we all know that the malicious code was hidden inside the legitimate medium right. This statement alone makes me furious that how is it possible? But after I heard the answer to this question it makes me very wondered. Because the answer to this question is steganography. All of you are surprised right. Because many of us will know this one early, but we can’t imagine that this one will also be used by cybercriminals. Same like you I’m also very shocked after read about this. Now you all understand why I chose this one right.

            “Nothing is perfect”

Right. Thank you for reading!!!

So the article is concluded here. I think I’ll explain it clearly. If you found anything wrong, then let me know through the comment section.

If you think the content given here is valuable, then share it with your friends and colleagues.

Once again thank you for reading!!!

Hide and Seek

Here we explore the hidden gems in the technical world.

Post a Comment

Previous Post Next Post