What is the difference between watermarking, steganography, and cryptography ?
While cryptography is about protecting the content of messages (their meaning), steganography is about concealing their very existence. It comes from Greek roots, literally means ‘covered writing’, and is usually interpreted to mean hiding information in other information. Examples include sending a message to a spy by marking certain letters in a newspaper using invisible ink, and adding sub-perceptible echo at certain places in an audio recording. It is often thought that communications may be secured by encrypting the traffic, but this has rarely been adequate in practice. Aneas the Tactician, and other classical writers, concentrated on methods for hiding messages rather than for enciphering them; and although modern cryptographic techniques started to develop during the Renaissance, we find in 1641 that John Wilkins still preferred hiding over ciphering because it arouses less suspicion. This preference persists in many operational contexts to this day. For example, an encrypted e
While cryptography is about protecting the content of messages (their meaning), steganography is about concealing their very existence. It comes from Greek roots, literally means ‘covered writing’, and is usually interpreted to mean hiding information in other information. Examples include sending a message to a spy by marking certain letters in a newspaper using invisible ink, and adding sub-perceptible echo at certain places in an audio recording. It is often thought that communications may be secured by encrypting the traffic, but this has rarely been adequate in practice. Ãneas the Tactician, and other classical writers, concentrated on methods for hiding messages rather than for enciphering them; and although modern cryptographic techniques started to develop during the Renaissance, we find in 1641 that John Wilkins still preferred hiding over ciphering because it arouses less suspicion. This preference persists in many operational contexts to this day. For example, an encrypted e