SlideShare a Scribd company logo
1 of 10
STEGANOGRAPHY
Submitted by
K.Priyadarsini II M.SC(CS& IT)
N.Pandimeena II M.SC(CS& IT)
V.Sarmila II M.SC(CS& IT)
Nadar saraswathi college of arts and science,
Theni.
 A plaintext message may be hidden in one of
two ways.
 The methods of steganography conceal the
existence of the message , whereas the methods of
cryptography render the message unintelligible to
outsiders by various transformations of the text.
 A simple form of steganography , but one that
is time-consuming to construct , is one in which an
arrangement of word or letters within an apparently
innocuous text spells out the real message.
 The sequence of first letters of each word of
the overall message spells out the hidden
message.
 Various others techniques have been used
historically.
 Some examples are the following [MYER91]:
Types:
1. Character marking
2. Invisible link
3. Pin punctures
4. Typewriter correction ribbon
Character marking:
Selected letters of printed or typewritten
text are overwritten in pencil.
The marks are ordinarily not visible
unless the paper is held at an angle to bright light.
Invisible link:
A number of substances can be used
for writing but leave no visible trace until heat or
some chemical is applied to the paper.
Pin punctures:
Small pin punctures on selected letters
are ordinarily not visible unless the paper is held up
in front of a light.
Typewriter correction ribbon:
Used between lines typed with the black
ribbon , the result of typing with the correction tape
are visible only under a strong light .
 These techniques may seem archaic , they have
contemporary equivalents .
 [WAYN93] proposes hiding a message by using the
least significant bits of frames on a CD.
 The least significant bit of each 24-bit pixel can be
changed without greatly affecting the quality of the
image .
 The result is that you can hide a 2.3-megabyte
message in a single digital snapshot.
 There are now a number of software packages
available that take this type of approach to
steganography.
 Steganography has a number of drawbacks
when compared to encryption .
 It requires a lot of overhead to hide a relatively
few bits of information .
 Although using some scheme like that
proposed in the preceding paragraph may make it
more effective .
 Also once the system is discovered , it
becomes virtually worthless .
Advantages:
 The advantage of steganography is that it can
be employed by parties who have something to
lose should the fact of their secret communication
be discovered .
 Encryption flags traffic as important or may
identify the sender or receiver as someone with
something to hide .
steganography

More Related Content

What's hot

Multi-Level audio steganography
Multi-Level audio steganographyMulti-Level audio steganography
Multi-Level audio steganographyARYA TM
 
Steganography in android to hide applications
Steganography in android to hide applicationsSteganography in android to hide applications
Steganography in android to hide applicationsManasitilak
 
Pertemuan 3 information hiding steganography
Pertemuan 3 information hiding steganographyPertemuan 3 information hiding steganography
Pertemuan 3 information hiding steganographynewbie2019
 
Audio steganography
Audio steganography Audio steganography
Audio steganography Sharath Reddy
 
Steganography and its techniques
Steganography and its techniquesSteganography and its techniques
Steganography and its techniquesFatema Panvelwala
 
SEMINAR ON staganography
SEMINAR ON staganographySEMINAR ON staganography
SEMINAR ON staganographyKamonasish Hore
 
network security, cryptography,steganography
network security, cryptography,steganographynetwork security, cryptography,steganography
network security, cryptography,steganographyNikhil l
 
Cryptography and E-Commerce
Cryptography and E-CommerceCryptography and E-Commerce
Cryptography and E-CommerceHiep Luong
 
Hungarian-Puzzled Text with Dynamic Quadratic Embedding Steganography
Hungarian-Puzzled Text with Dynamic Quadratic Embedding SteganographyHungarian-Puzzled Text with Dynamic Quadratic Embedding Steganography
Hungarian-Puzzled Text with Dynamic Quadratic Embedding SteganographyIJECEIAES
 

What's hot (20)

Multi-Level audio steganography
Multi-Level audio steganographyMulti-Level audio steganography
Multi-Level audio steganography
 
steganography
steganographysteganography
steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography in android to hide applications
Steganography in android to hide applicationsSteganography in android to hide applications
Steganography in android to hide applications
 
Pertemuan 3 information hiding steganography
Pertemuan 3 information hiding steganographyPertemuan 3 information hiding steganography
Pertemuan 3 information hiding steganography
 
Audio steganography
Audio steganography Audio steganography
Audio steganography
 
Steganography and its techniques
Steganography and its techniquesSteganography and its techniques
Steganography and its techniques
 
Steganography
SteganographySteganography
Steganography
 
Steganography in images
Steganography in imagesSteganography in images
Steganography in images
 
SEMINAR ON staganography
SEMINAR ON staganographySEMINAR ON staganography
SEMINAR ON staganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
ANURADHA_FINAL_REPORT
ANURADHA_FINAL_REPORTANURADHA_FINAL_REPORT
ANURADHA_FINAL_REPORT
 
About Steganography
About SteganographyAbout Steganography
About Steganography
 
PPT steganography
PPT steganographyPPT steganography
PPT steganography
 
Cryptography and Steganography
Cryptography and SteganographyCryptography and Steganography
Cryptography and Steganography
 
network security, cryptography,steganography
network security, cryptography,steganographynetwork security, cryptography,steganography
network security, cryptography,steganography
 
Cryptography and E-Commerce
Cryptography and E-CommerceCryptography and E-Commerce
Cryptography and E-Commerce
 
Hungarian-Puzzled Text with Dynamic Quadratic Embedding Steganography
Hungarian-Puzzled Text with Dynamic Quadratic Embedding SteganographyHungarian-Puzzled Text with Dynamic Quadratic Embedding Steganography
Hungarian-Puzzled Text with Dynamic Quadratic Embedding Steganography
 

Similar to steganography

A Survey Of Text Steganography Methods
A Survey Of Text Steganography MethodsA Survey Of Text Steganography Methods
A Survey Of Text Steganography MethodsLisa Brewer
 
Feature Selection Algorithm for Supervised and Semisupervised Clustering
Feature Selection Algorithm for Supervised and Semisupervised ClusteringFeature Selection Algorithm for Supervised and Semisupervised Clustering
Feature Selection Algorithm for Supervised and Semisupervised ClusteringEditor IJCATR
 
Steganography using Interpolation and LSB with Cryptography on Video Images -...
Steganography using Interpolation and LSB with Cryptography on Video Images -...Steganography using Interpolation and LSB with Cryptography on Video Images -...
Steganography using Interpolation and LSB with Cryptography on Video Images -...Editor IJCATR
 
Steganography using Interpolation and LSB with Cryptography on Video Images-A...
Steganography using Interpolation and LSB with Cryptography on Video Images-A...Steganography using Interpolation and LSB with Cryptography on Video Images-A...
Steganography using Interpolation and LSB with Cryptography on Video Images-A...Editor IJCATR
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
Steganographic Technique Using Instant Messaging Conversation Dynamics
Steganographic Technique Using Instant Messaging Conversation DynamicsSteganographic Technique Using Instant Messaging Conversation Dynamics
Steganographic Technique Using Instant Messaging Conversation DynamicsQUESTJOURNAL
 
Data security using stegnography and quantum cryptography
Data security using stegnography and quantum cryptographyData security using stegnography and quantum cryptography
Data security using stegnography and quantum cryptographyAlexander Decker
 
Steganography
SteganographySteganography
SteganographyPavninder
 
SteganographySecond
SteganographySecondSteganographySecond
SteganographySecondKiakaha17
 
Steganography and Its Applications in Security
Steganography and Its Applications in SecuritySteganography and Its Applications in Security
Steganography and Its Applications in SecurityIJMER
 
Text Embedded System using LSB Method
Text Embedded System using LSB MethodText Embedded System using LSB Method
Text Embedded System using LSB Methodijtsrd
 
steganography-252-uzLRCSm.pptx
steganography-252-uzLRCSm.pptxsteganography-252-uzLRCSm.pptx
steganography-252-uzLRCSm.pptxAkashBhosale50
 
A Novel Steganography Technique that Embeds Security along with Compression
A Novel Steganography Technique that Embeds Security along with CompressionA Novel Steganography Technique that Embeds Security along with Compression
A Novel Steganography Technique that Embeds Security along with CompressionCSCJournals
 
B03208016
B03208016B03208016
B03208016inventy
 
Paper id 27201444
Paper id 27201444Paper id 27201444
Paper id 27201444IJRAT
 
CSE steganography for data writing and reading
CSE steganography for data writing and readingCSE steganography for data writing and reading
CSE steganography for data writing and readingmisbanausheenparvam
 
QUATERNİON SECURİTY USİNG MODİFYİNG VERNAM CİPHER WİTH İMAGE STEGANOGRAPHY
QUATERNİON SECURİTY USİNG MODİFYİNG VERNAM CİPHER WİTH İMAGE STEGANOGRAPHYQUATERNİON SECURİTY USİNG MODİFYİNG VERNAM CİPHER WİTH İMAGE STEGANOGRAPHY
QUATERNİON SECURİTY USİNG MODİFYİNG VERNAM CİPHER WİTH İMAGE STEGANOGRAPHYijma
 
A Survey Paper On Different Steganography Technique
A Survey Paper On Different Steganography TechniqueA Survey Paper On Different Steganography Technique
A Survey Paper On Different Steganography TechniqueJeff Brooks
 

Similar to steganography (20)

A Survey Of Text Steganography Methods
A Survey Of Text Steganography MethodsA Survey Of Text Steganography Methods
A Survey Of Text Steganography Methods
 
Feature Selection Algorithm for Supervised and Semisupervised Clustering
Feature Selection Algorithm for Supervised and Semisupervised ClusteringFeature Selection Algorithm for Supervised and Semisupervised Clustering
Feature Selection Algorithm for Supervised and Semisupervised Clustering
 
Steganography using Interpolation and LSB with Cryptography on Video Images -...
Steganography using Interpolation and LSB with Cryptography on Video Images -...Steganography using Interpolation and LSB with Cryptography on Video Images -...
Steganography using Interpolation and LSB with Cryptography on Video Images -...
 
Steganography using Interpolation and LSB with Cryptography on Video Images-A...
Steganography using Interpolation and LSB with Cryptography on Video Images-A...Steganography using Interpolation and LSB with Cryptography on Video Images-A...
Steganography using Interpolation and LSB with Cryptography on Video Images-A...
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Hi3612991303
Hi3612991303Hi3612991303
Hi3612991303
 
Steganographic Technique Using Instant Messaging Conversation Dynamics
Steganographic Technique Using Instant Messaging Conversation DynamicsSteganographic Technique Using Instant Messaging Conversation Dynamics
Steganographic Technique Using Instant Messaging Conversation Dynamics
 
Data security using stegnography and quantum cryptography
Data security using stegnography and quantum cryptographyData security using stegnography and quantum cryptography
Data security using stegnography and quantum cryptography
 
Steganography
SteganographySteganography
Steganography
 
SteganographySecond
SteganographySecondSteganographySecond
SteganographySecond
 
Steganography and Its Applications in Security
Steganography and Its Applications in SecuritySteganography and Its Applications in Security
Steganography and Its Applications in Security
 
Steganography
SteganographySteganography
Steganography
 
Text Embedded System using LSB Method
Text Embedded System using LSB MethodText Embedded System using LSB Method
Text Embedded System using LSB Method
 
steganography-252-uzLRCSm.pptx
steganography-252-uzLRCSm.pptxsteganography-252-uzLRCSm.pptx
steganography-252-uzLRCSm.pptx
 
A Novel Steganography Technique that Embeds Security along with Compression
A Novel Steganography Technique that Embeds Security along with CompressionA Novel Steganography Technique that Embeds Security along with Compression
A Novel Steganography Technique that Embeds Security along with Compression
 
B03208016
B03208016B03208016
B03208016
 
Paper id 27201444
Paper id 27201444Paper id 27201444
Paper id 27201444
 
CSE steganography for data writing and reading
CSE steganography for data writing and readingCSE steganography for data writing and reading
CSE steganography for data writing and reading
 
QUATERNİON SECURİTY USİNG MODİFYİNG VERNAM CİPHER WİTH İMAGE STEGANOGRAPHY
QUATERNİON SECURİTY USİNG MODİFYİNG VERNAM CİPHER WİTH İMAGE STEGANOGRAPHYQUATERNİON SECURİTY USİNG MODİFYİNG VERNAM CİPHER WİTH İMAGE STEGANOGRAPHY
QUATERNİON SECURİTY USİNG MODİFYİNG VERNAM CİPHER WİTH İMAGE STEGANOGRAPHY
 
A Survey Paper On Different Steganography Technique
A Survey Paper On Different Steganography TechniqueA Survey Paper On Different Steganography Technique
A Survey Paper On Different Steganography Technique
 

Recently uploaded

Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...KokoStevan
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docxPoojaSen20
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxnegromaestrong
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 

Recently uploaded (20)

Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 

steganography

  • 1. STEGANOGRAPHY Submitted by K.Priyadarsini II M.SC(CS& IT) N.Pandimeena II M.SC(CS& IT) V.Sarmila II M.SC(CS& IT) Nadar saraswathi college of arts and science, Theni.
  • 2.
  • 3.  A plaintext message may be hidden in one of two ways.  The methods of steganography conceal the existence of the message , whereas the methods of cryptography render the message unintelligible to outsiders by various transformations of the text.  A simple form of steganography , but one that is time-consuming to construct , is one in which an arrangement of word or letters within an apparently innocuous text spells out the real message.
  • 4.  The sequence of first letters of each word of the overall message spells out the hidden message.  Various others techniques have been used historically.  Some examples are the following [MYER91]: Types: 1. Character marking 2. Invisible link 3. Pin punctures 4. Typewriter correction ribbon
  • 5. Character marking: Selected letters of printed or typewritten text are overwritten in pencil. The marks are ordinarily not visible unless the paper is held at an angle to bright light. Invisible link: A number of substances can be used for writing but leave no visible trace until heat or some chemical is applied to the paper.
  • 6. Pin punctures: Small pin punctures on selected letters are ordinarily not visible unless the paper is held up in front of a light. Typewriter correction ribbon: Used between lines typed with the black ribbon , the result of typing with the correction tape are visible only under a strong light .
  • 7.  These techniques may seem archaic , they have contemporary equivalents .  [WAYN93] proposes hiding a message by using the least significant bits of frames on a CD.  The least significant bit of each 24-bit pixel can be changed without greatly affecting the quality of the image .  The result is that you can hide a 2.3-megabyte message in a single digital snapshot.  There are now a number of software packages available that take this type of approach to steganography.
  • 8.  Steganography has a number of drawbacks when compared to encryption .  It requires a lot of overhead to hide a relatively few bits of information .  Although using some scheme like that proposed in the preceding paragraph may make it more effective .  Also once the system is discovered , it becomes virtually worthless .
  • 9. Advantages:  The advantage of steganography is that it can be employed by parties who have something to lose should the fact of their secret communication be discovered .  Encryption flags traffic as important or may identify the sender or receiver as someone with something to hide .