1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
juin [17]
3 years ago
5

Which of the following involves writing hidden messages so that only the sender and intended recipient know a message exists? St

eganography Anti-forensics Biometrics Virtualization security
Computers and Technology
1 answer:
AnnZ [28]3 years ago
6 0

Answer:

Steganography  

Explanation:

Steganography

This technique involves hiding the message being transferred between the sender and the recipient.

1. The message is hidden by converting the original message into covered or hidden writing. This is done using the key like in cryptography.

2. This hidden message is placed on the medium through which communication takes place. The medium is called as the carrier.

3. The key along with the covered message is also placed on the carrier. The recipient should receive both the message and the key.

Steganography can also be described as hiding the secret message inside an ordinary message. The key is used to unlock the secret message.

This process makes the actual message hidden for the naked eye.

Only the actual message is hidden, not the fact that the messages are being exchanged between the two parties.

The purpose of this technique is that the actual message should be viewed and understood by the sender and the recipient only.

Any third party should not be able to view and/ or understand the communication taking place even if the communication becomes accessible to any third party.

Unlike cryptography, the hidden message should not gain any attention of other parties involved.

Cryptography

This is different from cryptography. In cryptography, the actual message is converted into some other form called cipher text. The cipher text is not hidden between other messages; it is visible to the third party that the cipher text is being communicated.

Steganography techniques are applicable to all kinds of messages including text, audio, video and also images.

Uses

Steganography plays a vital role in preventing pirated copyright materials and also prevents unauthorized viewing of the material.

Techniques

1. Hash marking - The message is written in letters which also includes hash marks.

2. Watermarking - This technique includes hiding the copyrighted material between a collection of files. This gives additional protection to the material.

You might be interested in
Answer if you play PS4 apex legends if you do answer username and first to answer is brainliest
Vinil7 [7]

Answer:

I do not, sorry

Explanation:

3 0
3 years ago
Read 2 more answers
How do we benefit from this increased interconnectivity?
ankoles [38]
Well we just benefit from it like it just helps as I guess
8 0
2 years ago
During email encryption, the system creates which type of key to allow the user to send an encrypted email?
kiruha [24]
A hope this is correct just read an article on it
5 0
3 years ago
Read 2 more answers
Dani wants to create a web page to document her travel adventures. Which coding language should she use? HTML Java Python Text
Anna [14]

Answer:

HTML, CSS, JavaScript, python, SQL

Explanation:

To create a web page for her travel adventures Dani has to use HTML and CSS to design the page's layout. A beautiful simple design such as one which shows photos of her on her travel destinations, and a paragraph for her to write a little story on her travels would do.

Dani needs JavaScript to animate the photos she's going to post on the page. Dani also should use python to build the backend of her page so she can write codes to save and access her documented adventures from the database. She should use a database language like SQL to save all of her adventures so she can view them at a later time for the memories.

7 0
3 years ago
By dividing the control plane from the data plane, SDN offers the flexibility to view the entire data plane infrastructure as a
Mariulka [41]

Answer:

Virtual

By dividing the control plane from the data plane, SDN offers the flexibility to view the entire data plane infrastructure as a Virtual resource that can be configured and controlled by an upper layer control plane.

Explanation:

The separating data plane (SDN) is used by users to hide the specifics of a device data layer so that all devices would be treated equally thereby representing the entire data plane as a  virtual abstract layer thus enhancing network efficiency.

The SDN work mainly on the Control and data plane separating both of the planes. Also, the SDN make networks more agile and flexible.

SDN provides the flexibility to view the entire data plane infrastructure as a

virtual resource that can be configured and controlled by an upper layer

control plane.

6 0
2 years ago
Read 2 more answers
Other questions:
  • Since the password includes all four types of characters (complex password) and is 8 characters long, what is the real reason th
    10·1 answer
  • The word count of the active document is typically displayed on the ________.
    15·1 answer
  • True or false? any webb app can be accessed and run on any computing
    12·1 answer
  • ______ is the software that prevents people from being able to access your personal information.
    8·2 answers
  • To find your personal learning style you can
    5·2 answers
  • g Design a Boolean function called isPrime, that accepts an integer as an argument and returns True if the argument is a prime n
    14·1 answer
  • You would like to put the data in order by product number. What should you do?
    15·1 answer
  • Please, ignore
    6·2 answers
  • Which software documentation guideline did the IEEE establish?
    10·1 answer
  • How do you measure the capacity of speed and memory of computer system<br>Explain.​
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!