**1. Steganography:**

Steganography is a method in which secret message is hidden in a cover media. Steganography means covered writing. Steganography is the idea to prevent secret information by creating the suspicion. Steganography is less popular than Cryptography. In steganography, structure of data is not usually altered.

The forms of steganography are:

1.Text2.Audio3.Video4.Images5.Network or Protocol

**2. Cryptography:**

Cryptography means secret writing. In cryptography, sender does not send message directly to the receiver, before sending information to the receiver information or plain text is converted into cipher text by using some encryption algorithm then send to the receiver and receiver decrypt the cipher text into plain text to read the original information.

It is of two types:

1.Symmetric key cryptography2.Asymmetric key cryptography

**The difference between Steganography and Cryptography:**

S.NO | Steganography | Cryptography |
---|---|---|

1. | Steganography means covered writing. |
Cryptography means secret writing. |

2. | Steganography is less popular than Cryptography. | While cryptography is more popular than Steganography. |

3. | Attack’s name in Steganography is Steganalysis. |
While in cryptography, Attack’s name is Cryptanalysis. |

4. | In steganography, structure of data is not usually altered. | While in cryptography, structure of data is altered. |

5. | Steganography supports Confidentiality and Authentication security principles. |
While cryptography supports Confidentiality and Authentication security principles as well as Data integrity and Non-repudiation. |

6. | In steganography, the fact that a secret communication is taking place is hidden. | While in cryptography only secret message is hidden. |

7. | In steganography, not much mathematical transformations are involved. | Cryptography involves the use of number theory, mathematics etc. to modify data |

Attention reader! Don’t stop learning now. Get hold of all the important CS Theory concepts for SDE interviews with the CS Theory Course at a student-friendly price and become industry ready.

## Recommended Posts:

- Image Steganography in Cryptography
- Classical Cryptography and Quantum Cryptography
- Early Evidence of Steganography
- Difference between Cryptography and Cryptology
- Differences between Classical and Quantum Cryptography
- Cryptography and its Types
- Cryptography and Network Security Principles
- Caesar Cipher in Cryptography
- RSA Algorithm in Cryptography
- The CIA triad in Cryptography
- Cryptography Introduction
- DNA Cryptography
- Birthday attack in Cryptography
- Development of Cryptography
- Quantum Cryptography
- One Time Password (OTP) algorithm in Cryptography
- Easy Key Management in Cryptography
- Bifid Cipher in Cryptography
- Avalanche Effect in Cryptography
- Knapsack Encryption Algorithm in Cryptography

If you like GeeksforGeeks and would like to contribute, you can also write an article using contribute.geeksforgeeks.org or mail your article to contribute@geeksforgeeks.org. See your article appearing on the GeeksforGeeks main page and help other Geeks.

Please Improve this article if you find anything incorrect by clicking on the "Improve Article" button below.