What is Steganography

1 Answer

Answer :

Invisible ink writing 

Related questions

Description : What are some good books about basic steganography techniques?

Last Answer : I can recommend a good new novel that involves steganography—“Daemon” by Daniel Suarez. About the best tech thriller I’ve ever read.

Description : Which of these exemplifies social steganography?

Last Answer : Sending a hidden message to invite certain people to a party

Description : Which among the following is correct: a) Traffic Analysis is the analysis of patterns of communication in order to learn secret information. b) Steganography is the study of hiding the very existence of a ... of the message itself like microdots or invisible ink. c) Both of Above d) None of These

Last Answer : c) Both of Above

Description : An example of the sub - fields of cryptography is: a) Steganography b) Traffic Analysis c) Both of Above d) None of These

Last Answer : c) Both of Above

Description : Which among the following is correct: a) Traffic Analysis is the analysis of patterns of communication in order to learn secret information. b) Steganography is the study of hiding the very existence of a ... of the message itself like microdots or invisible ink. c) Both of Above d) None of These

Last Answer : c) Both of Above

Description : An example of the sub - fields of cryptography is: a) Steganography b) Traffic Analysis c) Both of Above d) None of These

Last Answer : c) Both of Above

Description : What is called as the process of creation a duplicate of digital media for purpose of examining it? A. Acquisition. B. Steganography. C. Live analysis D. Hashing.

Last Answer : Acquisition.

Description : Validate your tools and verify your evidence with ____ to ensure its integrity a. hashing algorithms c. steganography b. watermarks d. digital certificates

Last Answer : a. hashing algorithms

Description : Validate your tools and verify your evidence with to ensure its integrity (a) Hashing algorithms (b) Steganography (c) Watermark (d) Digital certificates

Last Answer : (a) Hashing algorithms

Description : Using what, data hiding in encrypted images be carried out in digital forensics? A. Acquisition. B. Steganography. C. Live analysis D. Hashing

Last Answer : B. Steganography. 

Description : What is called as the process of creation a duplicate of digital media for purpose of examining it? A. Acquisition. B. Steganography. C. Live analysis D. Hashing. 

Last Answer : A. Acquisition.