Steganography Methods Confidential Data

Compare and contrast different types of Steganography methods that are used for hiding confidential data. Choose at least 4 to describe in detail.

Initial Post:

What are some of the challenges by type, that could present issues?

Are there any detection methods by type used to find such activities?

Given this day and age, are these methods still viable? Does steganography have any "competition"?

If so, what technology and why?
Response:

As you read your classmates' postings, think of areas where you can expand on the subject, conduct more research to further explore the topic, or examine the subject through different lenses and perspectives.

Regarding your response to your classmates: Please highlight a new facet to build on what your classmate stated, add to the conversation, or find an alternative viewpoint and support your response with citations. It's important to have more than “I agree” or “good point," when responding!

Try to complete your initial post early during the conference week (no later than Day 3 of the week) and plan to continue dialogue with your classmates throughout the remainder of the week. Think of our online conversations as discussion in a traditional classroom. Posting your initial post and responses at the last moment would be similar to walking into a classroom discussion with 10 minutes left in the class. You would miss the issues covered by your classmates! Remember, the intent of our conference discussion is to take the conversation to the next level - the Master's level of discussion.

In addition, posting early has its benefits. You have the opportunity to state your original thoughts without worrying that you are saying the same things that a classmate has already stated