1. Compare and contrast steganography and cryptography.
2. Why steganography and how does it work? List examples of
suitable carriers of steganographic payloads.
3. Experiment with the tool – Steganography Online
(http://stylesuxx.github.io/steganography/) to get a feel of how
the steganographic tool works.
4. In steganalysis, which methods are used to detect
steganography?
Briefly describe how cryptography is applied in ATM, SSL,
digital signatures, hashes and drive encryption.

1. Compare and contrast steganography and cryptography.2. Why st.docx

  • 1.
    1. Compare andcontrast steganography and cryptography. 2. Why steganography and how does it work? List examples of suitable carriers of steganographic payloads. 3. Experiment with the tool – Steganography Online (http://stylesuxx.github.io/steganography/) to get a feel of how the steganographic tool works. 4. In steganalysis, which methods are used to detect steganography? Briefly describe how cryptography is applied in ATM, SSL, digital signatures, hashes and drive encryption.