Professional Documents
Culture Documents
Layon
First, steganography comes from the Greek words stegos and graphia which means
covered writing. This concept was already used a long time ago and up to date, there
were a lot of studies on its effectiveness and still considered good practice for hiding
secret messages. Second, cryptography refers to the science of making and using
codes to secure the transmission of information from the sender to the receiver by
transforming plain text to ciphertext. On the other hand, digital watermarking refers to
the protection of intellectual property via putting a signature signifying the owner of the
document/message.
To discuss the difference between the three, please see the points below:
a.
Steganography - keeping the existence of a message secret
Cryptography - keeping the contents of a message secret
Digital Watermarking – keeping the property of the message/information
b.
Steganography and Cryptography – for confidentiality, protect from unauthorized
access to the message.
Digital Watermarking – protecting from intellectual property, signify ownership
c.
Steganography and Cryptography – Can combine.
d.
Steganography – output is invisible, hide the message/information
Cryptography – output is scrambled.
Digital Watermarking – output is marked the same way, visible
e.
Steganography – does not alter the overall structure of data
Cryptography – alters the overall structure of data
f.
Steganography – – once discovered, can easily get the message
Cryptography – once discovered, cannot easily get the message
References:
[1] R. Mishra and P. Bhanodiya, "A review on steganography and cryptography," 2015
International Conference on Advances in Computer Engineering and Applications,
2015, pp. 119-122, doi: 10.1109/ICACEA.2015.7164679.
[4] Rajgure, V. and Gaikwad, V., 2012. Steganography and Steganalysis : Different
Approaches. International Journal of Electronics Signals and Systems, pp.165-170.
[5] C. Burrows and P. B. Zadeh, "A mobile forensic investigation into steganography,"
2016 International Conference On Cyber Security And Protection Of Digital Services
(Cyber Security), 2016, pp. 1-2, doi: 10.1109/CyberSecPODS.2016.7502340.