You are on page 1of 2

Bernard N.

Layon

Discuss the difference between Cryptography, Steganography, and Digital


Watermarking.

One technique of hardening one's security in terms of confidentiality, integrity, and


accessibility is how to avoid eavesdropping where the usual man-in-the-middle attacks
occur. There were technologies in the present that is being used to perform such
activities, some of these are steganography, cryptography, and digital watermarking.

First, steganography comes from the Greek words stegos and graphia which means
covered writing. This concept was already used a long time ago and up to date, there
were a lot of studies on its effectiveness and still considered good practice for hiding
secret messages. Second, cryptography refers to the science of making and using
codes to secure the transmission of information from the sender to the receiver by
transforming plain text to ciphertext. On the other hand, digital watermarking refers to
the protection of intellectual property via putting a signature signifying the owner of the
document/message.

To discuss the difference between the three, please see the points below:

a.
Steganography - keeping the existence of a message secret
Cryptography - keeping the contents of a message secret
Digital Watermarking – keeping the property of the message/information

b.
Steganography and Cryptography – for confidentiality, protect from unauthorized
access to the message.
Digital Watermarking – protecting from intellectual property, signify ownership

c.
Steganography and Cryptography – Can combine.

d.
Steganography – output is invisible, hide the message/information
Cryptography – output is scrambled.
Digital Watermarking – output is marked the same way, visible

e.
Steganography – does not alter the overall structure of data
Cryptography – alters the overall structure of data

f.
Steganography – – once discovered, can easily get the message
Cryptography – once discovered, cannot easily get the message
References:

[1] R. Mishra and P. Bhanodiya, "A review on steganography and cryptography," 2015
International Conference on Advances in Computer Engineering and Applications,
2015, pp. 119-122, doi: 10.1109/ICACEA.2015.7164679.

[2] R. J. Anderson and F. A. P. Petitcolas, "On the limits of steganography," in IEEE


Journal on Selected Areas in Communications, vol. 16, no. 4, pp. 474-481, May 1998,
doi: 10.1109/49.668971.

[3] T. Morkel, J.H.P. Eloff, M.S. Olivier2015. AN OVERVIEW OF IMAGE


STEGANOGRAPHY. [online] Available at:
<https://www.academia.edu/2943481/An_overview_of_image_steganography?
auto=citations&from=cover_page> [Accessed 4 October 2021].

[4] Rajgure, V. and Gaikwad, V., 2012. Steganography and Steganalysis : Different
Approaches. International Journal of Electronics Signals and Systems, pp.165-170.

[5] C. Burrows and P. B. Zadeh, "A mobile forensic investigation into steganography,"
2016 International Conference On Cyber Security And Protection Of Digital Services
(Cyber Security), 2016, pp. 1-2, doi: 10.1109/CyberSecPODS.2016.7502340.

You might also like