{"id":562,"date":"2019-11-13T19:49:29","date_gmt":"2019-11-13T19:49:29","guid":{"rendered":"https:\/\/sectigostore.com\/blog\/?p=562"},"modified":"2020-03-04T20:42:55","modified_gmt":"2020-03-04T20:42:55","slug":"what-is-the-difference-between-steganography-vs-cryptography","status":"publish","type":"post","link":"https:\/\/sectigostore.com\/blog\/what-is-the-difference-between-steganography-vs-cryptography\/","title":{"rendered":"What is the Difference Between Steganography vs Cryptography?"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">Explore some popular steganography tools and how to perform steganalysis<\/h2>\n\n\n\n<p>As children, most of us have used lemon juice as invisible\nink to write messages to our friends. There was an indescribable thrill in\nwatching words appear \u2014 almost magically \u2014 when we held a white sheet of paper up\nin front of a candle flame. What you might not have known back then is how this\nexperiment demonstrates not only oxidation but also steganography! <\/p>\n\n\n\n<p>In this article, we\u2019ll look at some popular steganography tools and how they\u2019re useful in steganalysis. But before that, let\u2019s dive into some history on how steganography was introduced and what the differences are between steganography vs cryptography. <\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Security\nThrough Obscurity: What Is Steganography?<\/strong><\/h2>\n\n\n\n<p>Steganography is an age-old practice of hiding data (in any\nform \u2014 text, image, etc.) in plain sight within another object. This process\nallows you to transmit information undetected, without arousing any suspicion. <\/p>\n\n\n\n<p>While the first recorded use of steganography can be traced back to ancient Greece, it was Johannes Trithemius in 1499 who, with his book <a href=\"https:\/\/en.wikipedia.org\/wiki\/Steganographia\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">Steganographia<\/a>, officially gave it a name. Over the years, and as the results of technological advances, digital steganography has gained popularity. Examples of relatively recent steganography include: <\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>microdots being heavily used during the world\nwars, <\/li><li>prisoners blinking in Morse code, and<\/li><li>Cicada 3301 internet puzzles. <\/li><\/ul>\n\n\n\n<p>Steganography has even been used by modern spy rings such as the <a href=\"https:\/\/en.wikipedia.org\/wiki\/Illegals_Program\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">Illegals<\/a> Program, a network of Russian spies who used steganography to aimed to leak classified information back to Russian intelligence. <\/p>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"886\" height=\"1024\" src=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2019\/11\/steganography-886x1024.png\" alt=\"Graphic: A history of steganography and steganography tools\" class=\"wp-image-563\" srcset=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2019\/11\/steganography-886x1024.png 886w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2019\/11\/steganography-260x300.png 260w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2019\/11\/steganography-560x647.png 560w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2019\/11\/steganography-940x1086.png 940w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2019\/11\/steganography.png 1157w\" sizes=\"auto, (max-width: 886px) 100vw, 886px\" \/><\/figure>\n\n\n\n<p>So, how does steganography work? Let\u2019s consider the\nfollowing example:<\/p>\n\n\n\n<p>Suppose Erin wants to send a secret message to Todd without\nanybody\u2019s knowledge. He uses a steganographic method to conceal the secret\nmessage within a carrier object like an audio clip or an image file. The\nembedding process generates a new stego object that Erin can now send to Todd without\narousing suspicion. <\/p>\n\n\n\n<p>To a regular observer, it looks like an ordinary file since\nthe hidden message is invisible. Upon receiving the object, Todd uses the same\nsteganographic method to extract the secret message from the object. Sometimes\na key is used along with the steganographic method to provide additional\nsecurity. If Erin uses this added security measure, Todd must use the same key to\nextract the secret message.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>What Is\nCryptography?<\/strong><\/h2>\n\n\n\n<p>Cryptography is the method of protecting information by\ntransforming it using mathematical concepts and algorithms into an unreadable\nform. The data is encrypted using public or private key cryptography. In public\nkey (or symmetric key) cryptography, the same key is used to encrypt and\ndecrypt a message. In private key (or asymmetric key) cryptography, different\nkeys \u2014 a public and a secret key that are mathematically related to each other \u2014\nare used.<\/p>\n\n\n\n<p>Modern cryptography concerns itself with the following\nprimary objectives:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Confidentiality.<\/strong> The encrypted message\n(or ciphertext) can&#8217;t be decipherable to anyone for whom it was unintended<\/li><li><strong>Integrity.<\/strong> The message sent must be\ndelivered unaltered to the receiver, or the modification must at least be\ndetected.<\/li><li><strong>Non-repudiation.<\/strong> The sender cannot deny\nsending the message at a later stage, or a recipient can&#8217;t dispute receiving a\nmessage.<\/li><li><strong>Authentication. <\/strong>The sender and recipient\ncan confirm each other&#8217;s identity and the origin\/destination of the message.<\/li><li> <\/li><\/ul>\n\n\n\n<p>So, with all of this in mind, what is the difference between\nsteganography and cryptography?<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Steganography\nvs Cryptography<\/strong><\/h2>\n\n\n\n<p>Steganography is often confused with cryptography because\nboth the techniques intend to keep your data private from prying eyes. The ways\nthey achieve said goals, however, are very different: <\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>With cryptography, any eavesdropper will know\nthat the information you\u2019re exchanging has been encrypted and rendered\nunreadable without knowing the secret decryption key. <\/li><li>Steganography, on the other hand, camouflages\nyour data and transmits it using seemingly innocuous carrier media to prevent\nsnoops from knowing that a secret exchange is taking place.<\/li><\/ul>\n\n\n\n<table class=\"wp-block-table\"><tbody><tr><td>\n  Basis for Comparison\n  <\/td><td>\n  Steganography\n  <\/td><td>\n  Cryptography\n  <\/td><\/tr><tr><td>\n  <strong>Goal<\/strong>\n  <\/td><td>\n  Conceals the occurrence of any exchange\n  between parties to facilitate secret communication.\n  <\/td><td>\n  Encrypts the contents of visible\n  communications to protect the data.\n  <\/td><\/tr><tr><td>\n  <strong>Concealment Tactic<\/strong>\n  <\/td><td>\n  The embedded message is invisible to an\n  unaware observer.\n  <\/td><td>\n  The encrypted message is indecipherable\n  to anyone without the decryption key.\n  <\/td><\/tr><tr><td>\n  <strong>Supported Security Principles<\/strong>\n  <\/td><td>\n  Confidentiality and\n  authentication\n  <\/td><td>\n  Confidentiality, data integrity,\n  authentication, and non-repudiation\n  <\/td><\/tr><tr><td>\n  <strong>Implementation Techniques<\/strong>\n  <\/td><td>\n  Spatial domain, transform domain, distortion,\n  etc.\n  <\/td><td>   <a href=\"https:\/\/sectigostore.com\/blog\/hashing-vs-encryption-the-big-players-of-the-cyber-security-world\/\">Asymmetric key encryption<\/a>, symmetric   key encryption, etc.   <\/td><\/tr><tr><td>\n  <strong>Counter Steps<\/strong>\n  <\/td><td>\n  Use\n  rigid protocol specifications, data sanitizationMonitor\n  data exchanges, perform analyses that include looking for structural oddities\n  suggestive of manipulation\n  \n  <\/td><td>\n  Use\n  reverse engineering to break complex algorithms Implement\n  cryptography export laws that prohibit the transfer of such devices or\n  technology between countries\n  \n  <\/td><\/tr><\/tbody><\/table>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Steganography\nTools<\/strong><\/h2>\n\n\n\n<p>Let\u2019s explore a few steganography tools. We\u2019ll discuss how\nthey\u2019re used to hide and transmit information inconspicuously through files and\nmedia.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">1. Xiao Steganography&nbsp; <\/h3>\n\n\n\n<p><a href=\"https:\/\/xiao-steganography.en.softonic.com\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">Xiao Steganography<\/a> is a free tool with an easy to use interface. You can use this software to conceal your secret messages inside BMP images or WAV files. All you need to do is upload a WAV or BMP file as the carrier and then add the secret file which you wish to hide. It supports encryption algorithms like RC4, Triple DES, and hashing. Choose the algorithm you want to apply from the list and save the stego-medium. To decrypt it, the receiver will need to use the same tool.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">2. Steghide <\/h3>\n\n\n\n<p><a href=\"https:\/\/github.com\/StefanoDeVuono\/steghide\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">Steghide<\/a> is an open-source, command-line software that you can use to hide your message in an image or within an audio file.<\/p>\n\n\n\n<p>To insert your secret message within a carrier file, use the\nfollowing command after modifying the file extensions as required:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>> steghide embed -cf image.jpg -ef secret.txt<\/code><\/pre>\n\n\n\n<p>On the receiver&#8217;s end, to extract the secret image, run the\nfollowing command:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>> steghide extract -sf image.jpg<\/code><\/pre>\n\n\n\n<p>To view additional info on the file received, before\nproceeding to extract it, you can execute the command as follows:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>> steghide info image.jpg<\/code><\/pre>\n\n\n\n<p>Note: This tool accepts input in the form of JPEG, BMP, WAV, and AU, and the embedded message is not limited to text. It uses Rijndael\u2019s algorithm, a block cipher with a key size of 128 bits, and it&#8217;s recommended for Mac and Linux users.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">3. Crypture<\/h3>\n\n\n\n<p><a href=\"https:\/\/sourceforge.net\/projects\/crypture\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"Crypture (opens in a new tab)\">Crypture<\/a> is another command-line tool that accepts BMP as the input file within which you can hide your messages. One constraint is that the BMP image file needs to be eight times larger than your secret data file. On the bright side, though, the software itself is only 6 KBs in size and doesn&#8217;t require any installation.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">4. SSuite Picsel Security<\/h3>\n\n\n\n<p><a href=\"https:\/\/download.cnet.com\/SSuite-Picsel-Security\/3000-2092_4-75992724.html\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"SSuite Picsel (opens in a new tab)\">SSuite Picsel<\/a>, a leading product from the SSuite office software, is a free portable standalone application for steganography. You can use this tool to hide text within image files using a different approach that uses image files as keys. In addition to the image file where you embed the secret message, another image file is used as a key instead of a passphrase for encryption. It accepts BMP, JPG, JPEG, and WMF as input files.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">5. DeepSound<\/h3>\n\n\n\n<p><a href=\"https:\/\/www.darknet.org.uk\/2019\/03\/deepsound-audio-steganography-tool\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"DeepSound (opens in a new tab)\">DeepSound<\/a> is an audio steganography tool that hides or extracts secret messages within or from your audio files or audio CD tracks. It also supports encryption using AES-256 to improve data protection. Additionally, the application comes with an easy to use audio converter module with support for several audio formats, including FLAC, MP3, WMA, WAV, and APE.<\/p>\n\n\n\n<p>Some alternative options include tools like <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/www.softpedia.com\/get\/Security\/Encrypting\/StegoMagic.shtml\" target=\"_blank\">StegoMagic<\/a>, <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/embeddedsw.net\/OpenPuff_Steganography_Home.html\" target=\"_blank\">OpenPuff<\/a>, <a href=\"https:\/\/sourceforge.net\/projects\/netcross\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">Netcross<\/a>, etc. <\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Steganalysis<\/strong><\/h2>\n\n\n\n<p>Now that we have taken a look at how to conceal information,\nhow do we detect when messages are hidden using steganography? Steganalysis is niche\narea in the field of information hiding that does precisely that. This process\naims to identify suspected packages, determine whether they have hidden\npayloads, and, if feasible, attempts to recover them. Steganography and\nsteganalysis are, essentially, two sides to the same coin \u2014 the former conceals,\nand the latter detects and recovers.<\/p>\n\n\n\n<p>Several methods and techniques can be used to perform\nsteganalysis, but they can broadly be classified into two types \u2014 targeted (or\nspecific) steganalysis and blind (or universal) steganalysis. The targeted\nsteganalysis method is entirely dependent on the steganographic algorithm that\nis used to conceal the secret data, whereas with blind steganalysis, the\nprocesses are independent of the underlying algorithm. Targeted steganalysis\ncan further be categorized as visual, statistical, and structural attacks. <\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Steganalysis\nTools<\/strong><\/h3>\n\n\n\n<p>Listed below are some tools you can explore to try your hand\nat steganalysis: <\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/github.com\/b3dk7\/StegExpose\" target=\"_blank\">StegExpose<\/a> is a steganalysis tool, specializing in the detection of LSB steganography (LSB stands for \u201cleast significant bit\u201d) and quantitative steganalysis. It can detect manipulation in lossless images like PNG and BMP and comes with a command-line interface. It analyzes images in bulk and produces reports and customizations that add a layer of simplicity for any non-forensic user. <\/li><li><a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/github.com\/abeluck\/stegdetect\" target=\"_blank\">Stegdetect<\/a> is another commonly used steganalysis tool by security researcher Niels Provos. <a href=\"https:\/\/www.wetstonetech.com\/products\/stegohunt\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">StegoHunt<\/a> is a commercial product that can be used as an alternative.<\/li><\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Explore some popular steganography tools and how to perform steganalysis As children, most of us have used lemon juice as invisible ink to write messages to our friends. There was&#8230;<\/p>\n","protected":false},"author":9,"featured_media":564,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[13,9],"tags":[21,20],"class_list":["post-562","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security","category-encryption","tag-cryptography","tag-steganography","post-with-tags"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>What is the Difference Between Steganography vs Cryptography? - InfoSec Insights<\/title>\n<meta name=\"description\" content=\"There&#039;s a lot know in the field of information hiding. Learn about steganography vs cryptography \u2014 how each works &amp; explore some steganography tools.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sectigostore.com\/blog\/what-is-the-difference-between-steganography-vs-cryptography\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is the Difference Between Steganography vs Cryptography? - InfoSec Insights\" \/>\n<meta property=\"og:description\" content=\"There&#039;s a lot know in the field of information hiding. Learn about steganography vs cryptography \u2014 how each works &amp; explore some steganography tools.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sectigostore.com\/blog\/what-is-the-difference-between-steganography-vs-cryptography\/\" \/>\n<meta property=\"og:site_name\" content=\"InfoSec Insights\" \/>\n<meta property=\"article:published_time\" content=\"2019-11-13T19:49:29+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-03-04T20:42:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2019\/11\/steganography-vs-cryptography.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1600\" \/>\n\t<meta property=\"og:image:height\" content=\"1100\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Lumena Mukherjee\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lumena Mukherjee\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-the-difference-between-steganography-vs-cryptography\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-the-difference-between-steganography-vs-cryptography\\\/\"},\"author\":{\"name\":\"Lumena Mukherjee\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#\\\/schema\\\/person\\\/8fc401352fbdfcfdf08996099c088b1f\"},\"headline\":\"What is the Difference Between Steganography vs Cryptography?\",\"datePublished\":\"2019-11-13T19:49:29+00:00\",\"dateModified\":\"2020-03-04T20:42:55+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-the-difference-between-steganography-vs-cryptography\\\/\"},\"wordCount\":1459,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-the-difference-between-steganography-vs-cryptography\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/11\\\/steganography-vs-cryptography.jpg\",\"keywords\":[\"cryptography\",\"steganography\"],\"articleSection\":[\"Cyber Security\",\"Encryption\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-the-difference-between-steganography-vs-cryptography\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-the-difference-between-steganography-vs-cryptography\\\/\",\"url\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-the-difference-between-steganography-vs-cryptography\\\/\",\"name\":\"What is the Difference Between Steganography vs Cryptography? - InfoSec Insights\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-the-difference-between-steganography-vs-cryptography\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-the-difference-between-steganography-vs-cryptography\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/11\\\/steganography-vs-cryptography.jpg\",\"datePublished\":\"2019-11-13T19:49:29+00:00\",\"dateModified\":\"2020-03-04T20:42:55+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#\\\/schema\\\/person\\\/8fc401352fbdfcfdf08996099c088b1f\"},\"description\":\"There's a lot know in the field of information hiding. Learn about steganography vs cryptography \u2014 how each works & explore some steganography tools.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-the-difference-between-steganography-vs-cryptography\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-the-difference-between-steganography-vs-cryptography\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-the-difference-between-steganography-vs-cryptography\\\/#primaryimage\",\"url\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/11\\\/steganography-vs-cryptography.jpg\",\"contentUrl\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/11\\\/steganography-vs-cryptography.jpg\",\"width\":1600,\"height\":1100},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-the-difference-between-steganography-vs-cryptography\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What is the Difference Between Steganography vs Cryptography?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/\",\"name\":\"InfoSec Insights\",\"description\":\"SectigoStore.com Blog\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#\\\/schema\\\/person\\\/8fc401352fbdfcfdf08996099c088b1f\",\"name\":\"Lumena Mukherjee\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/8a52ef8468ca2c6184cc71ebfa0bcdbf4c16ab01d988415c1bc743cb16730db3?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/8a52ef8468ca2c6184cc71ebfa0bcdbf4c16ab01d988415c1bc743cb16730db3?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/8a52ef8468ca2c6184cc71ebfa0bcdbf4c16ab01d988415c1bc743cb16730db3?s=96&d=mm&r=g\",\"caption\":\"Lumena Mukherjee\"},\"description\":\"Lumena is a cybersecurity consultant, tech writer, and regular columnist for InfoSec Insights. She is currently pursuing her masters in cybersecurity and has a passion for helping companies implement better security programs to protect their customers' data.\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What is the Difference Between Steganography vs Cryptography? - InfoSec Insights","description":"There's a lot know in the field of information hiding. Learn about steganography vs cryptography \u2014 how each works & explore some steganography tools.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sectigostore.com\/blog\/what-is-the-difference-between-steganography-vs-cryptography\/","og_locale":"en_US","og_type":"article","og_title":"What is the Difference Between Steganography vs Cryptography? - InfoSec Insights","og_description":"There's a lot know in the field of information hiding. Learn about steganography vs cryptography \u2014 how each works & explore some steganography tools.","og_url":"https:\/\/sectigostore.com\/blog\/what-is-the-difference-between-steganography-vs-cryptography\/","og_site_name":"InfoSec Insights","article_published_time":"2019-11-13T19:49:29+00:00","article_modified_time":"2020-03-04T20:42:55+00:00","og_image":[{"width":1600,"height":1100,"url":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2019\/11\/steganography-vs-cryptography.jpg","type":"image\/jpeg"}],"author":"Lumena Mukherjee","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Lumena Mukherjee","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sectigostore.com\/blog\/what-is-the-difference-between-steganography-vs-cryptography\/#article","isPartOf":{"@id":"https:\/\/sectigostore.com\/blog\/what-is-the-difference-between-steganography-vs-cryptography\/"},"author":{"name":"Lumena Mukherjee","@id":"https:\/\/sectigostore.com\/blog\/#\/schema\/person\/8fc401352fbdfcfdf08996099c088b1f"},"headline":"What is the Difference Between Steganography vs Cryptography?","datePublished":"2019-11-13T19:49:29+00:00","dateModified":"2020-03-04T20:42:55+00:00","mainEntityOfPage":{"@id":"https:\/\/sectigostore.com\/blog\/what-is-the-difference-between-steganography-vs-cryptography\/"},"wordCount":1459,"commentCount":0,"image":{"@id":"https:\/\/sectigostore.com\/blog\/what-is-the-difference-between-steganography-vs-cryptography\/#primaryimage"},"thumbnailUrl":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2019\/11\/steganography-vs-cryptography.jpg","keywords":["cryptography","steganography"],"articleSection":["Cyber Security","Encryption"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/sectigostore.com\/blog\/what-is-the-difference-between-steganography-vs-cryptography\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/sectigostore.com\/blog\/what-is-the-difference-between-steganography-vs-cryptography\/","url":"https:\/\/sectigostore.com\/blog\/what-is-the-difference-between-steganography-vs-cryptography\/","name":"What is the Difference Between Steganography vs Cryptography? - InfoSec Insights","isPartOf":{"@id":"https:\/\/sectigostore.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sectigostore.com\/blog\/what-is-the-difference-between-steganography-vs-cryptography\/#primaryimage"},"image":{"@id":"https:\/\/sectigostore.com\/blog\/what-is-the-difference-between-steganography-vs-cryptography\/#primaryimage"},"thumbnailUrl":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2019\/11\/steganography-vs-cryptography.jpg","datePublished":"2019-11-13T19:49:29+00:00","dateModified":"2020-03-04T20:42:55+00:00","author":{"@id":"https:\/\/sectigostore.com\/blog\/#\/schema\/person\/8fc401352fbdfcfdf08996099c088b1f"},"description":"There's a lot know in the field of information hiding. Learn about steganography vs cryptography \u2014 how each works & explore some steganography tools.","breadcrumb":{"@id":"https:\/\/sectigostore.com\/blog\/what-is-the-difference-between-steganography-vs-cryptography\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sectigostore.com\/blog\/what-is-the-difference-between-steganography-vs-cryptography\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sectigostore.com\/blog\/what-is-the-difference-between-steganography-vs-cryptography\/#primaryimage","url":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2019\/11\/steganography-vs-cryptography.jpg","contentUrl":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2019\/11\/steganography-vs-cryptography.jpg","width":1600,"height":1100},{"@type":"BreadcrumbList","@id":"https:\/\/sectigostore.com\/blog\/what-is-the-difference-between-steganography-vs-cryptography\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sectigostore.com\/blog\/"},{"@type":"ListItem","position":2,"name":"What is the Difference Between Steganography vs Cryptography?"}]},{"@type":"WebSite","@id":"https:\/\/sectigostore.com\/blog\/#website","url":"https:\/\/sectigostore.com\/blog\/","name":"InfoSec Insights","description":"SectigoStore.com Blog","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sectigostore.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/sectigostore.com\/blog\/#\/schema\/person\/8fc401352fbdfcfdf08996099c088b1f","name":"Lumena Mukherjee","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/8a52ef8468ca2c6184cc71ebfa0bcdbf4c16ab01d988415c1bc743cb16730db3?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/8a52ef8468ca2c6184cc71ebfa0bcdbf4c16ab01d988415c1bc743cb16730db3?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8a52ef8468ca2c6184cc71ebfa0bcdbf4c16ab01d988415c1bc743cb16730db3?s=96&d=mm&r=g","caption":"Lumena Mukherjee"},"description":"Lumena is a cybersecurity consultant, tech writer, and regular columnist for InfoSec Insights. She is currently pursuing her masters in cybersecurity and has a passion for helping companies implement better security programs to protect their customers' data."}]}},"_links":{"self":[{"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/posts\/562","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/comments?post=562"}],"version-history":[{"count":2,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/posts\/562\/revisions"}],"predecessor-version":[{"id":566,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/posts\/562\/revisions\/566"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/media\/564"}],"wp:attachment":[{"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/media?parent=562"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/categories?post=562"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/tags?post=562"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}