1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
juin [17]
3 years ago
5

Which of the following involves writing hidden messages so that only the sender and intended recipient know a message exists? St

eganography Anti-forensics Biometrics Virtualization security
Computers and Technology
1 answer:
AnnZ [28]3 years ago
6 0

Answer:

Steganography  

Explanation:

Steganography

This technique involves hiding the message being transferred between the sender and the recipient.

1. The message is hidden by converting the original message into covered or hidden writing. This is done using the key like in cryptography.

2. This hidden message is placed on the medium through which communication takes place. The medium is called as the carrier.

3. The key along with the covered message is also placed on the carrier. The recipient should receive both the message and the key.

Steganography can also be described as hiding the secret message inside an ordinary message. The key is used to unlock the secret message.

This process makes the actual message hidden for the naked eye.

Only the actual message is hidden, not the fact that the messages are being exchanged between the two parties.

The purpose of this technique is that the actual message should be viewed and understood by the sender and the recipient only.

Any third party should not be able to view and/ or understand the communication taking place even if the communication becomes accessible to any third party.

Unlike cryptography, the hidden message should not gain any attention of other parties involved.

Cryptography

This is different from cryptography. In cryptography, the actual message is converted into some other form called cipher text. The cipher text is not hidden between other messages; it is visible to the third party that the cipher text is being communicated.

Steganography techniques are applicable to all kinds of messages including text, audio, video and also images.

Uses

Steganography plays a vital role in preventing pirated copyright materials and also prevents unauthorized viewing of the material.

Techniques

1. Hash marking - The message is written in letters which also includes hash marks.

2. Watermarking - This technique includes hiding the copyrighted material between a collection of files. This gives additional protection to the material.

You might be interested in
This is not a factor that you should use to determine the content of your presentation. Your audience your goals your purpose yo
aksik [14]

Your technology I believe

4 0
3 years ago
Read 2 more answers
Can an engine run on air? I think it can, but I am not sure
Svetlanka [38]

Hello,

NO, and engine can run on steam, gas and other things but not air.

-Bella

3 0
3 years ago
Read 2 more answers
What is output if the user types in 8
Lady_Fox [76]

Answer: 8

And if you hold shift while typing it, it gives *

7 0
3 years ago
What is the famous saying among computer programmers that refers to the fact that computers cannot tell the difference between g
jek_recluse [69]

Answer:

Garbage in, garbage out

Explanation:

Garbage in, garbage out is the famous saying among computer programmers that incorrect, poor-quality, flawed, or nonsense input will produce incorrect, poor-quality, flawed, or nonsense output while correct, good quality or valuable input will produce correct, good quality or valuable output. it is basically saying that computers cannot tell the difference between good and bad data.

7 0
3 years ago
Read 2 more answers
This type of software can be described as end user software and is used to accomplish a variety of tasks. communications system
dezoksy [38]
This answer to this question is System
3 0
2 years ago
Other questions:
  • ________ are devices used to send data between two networks.
    11·1 answer
  • User accounts will be locked out after authentication is attempted
    7·1 answer
  • If you are driving at night, you should not use high-beam headlights within _________ of oncoming vehicles. Florida Road Rules 4
    9·2 answers
  • A(n) ________ is usually a live broadcast of audio or video content. Select one: A. instant message B. webcast C. podcast D. wik
    11·2 answers
  • The area of a square is stored in a double variable named area. write an expression whose value is length of the diagonal of the
    8·1 answer
  • 8.13 LAB: Elements in a range Write a program that first gets a list of integers from input. That list is followed by two more i
    8·1 answer
  • Identify three best -selling tablet on the market, and decide on the one that you would like to buy? justify your respone
    9·1 answer
  • IF U LOVE CODING CLICK HERE!!! : )
    14·1 answer
  • A computer on a network that is not the server​
    15·1 answer
  • Sharon's company has written a new computer program, and she has been asked to find a way to prevent people from copying the sof
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!