O'Reilly logo

TICSA TruSecure™ ICSA Certified Security Associate Exam TU0-001 by Shawn Porter, Debra Littlejohn Shinder, Mike Chapple

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Steganography

One of the problems with encrypting data is that the very act serves as an alert that the data is sensitive or confidential. The last thing you want to do, when your goal is to hide the contents of a file or message from others, is to draw attention to that file or message.

Steganography can be used in conjunction with encryption to provide greater security by hiding the encrypted data inside another piece of data.

History of Steganography

The term steganography is derived from the Greek word for “covered writing” and the concept predates the computer age. An early method of steganography involved shaving the head and tattooing a message on the scalp, and then letting the hair grow back to cover it up.

“Invisible” ink, using substances ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required