Describe the two major forms of steganography.

What will be an ideal response?


?The two major forms of steganography are insertion and substitution. Insertion places data from a secret file into a host file. This inserted data can only be viewed if the data structure is closely analyzed. Substitution, on the other hand, replaces bits of the host file with other bits of data. To avoid detection of this method, only the bits that result in the least amount of change are substituted. 

Computer Science & Information Technology

You might also like to view...

Portions of statements that contain calculations are called

a. variables. b. constants. c. expressions. d. None of the above.

Computer Science & Information Technology

Table Styles are displayed in the ________ group on the TABLE TOOLS DESIGN tab

Fill in the blank(s) with correct word

Computer Science & Information Technology

Discuss the IP addresses that NAT uses.

What will be an ideal response?

Computer Science & Information Technology

Wildcards are symbols that represent any character or combination of characters.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology