CSL Ia2
CSL Ia2
Q) Steganography ->
Steganography is the practice of like Least Significant Bit (LSB)
concealing information within modification.
another file, message, image, or 2. Audio Steganography: Embedding
video, such that the presence of the secret data into sound files by
hidden information is not obvious. modifying subtle audio properties,
Unlike cryptography, which focuses such as frequency or amplitude.
on encrypting the message, 3. Video Steganography: Concealing
steganography hides the message in information within video files by
plain sight. The goal is to prevent modifying pixel frames or
anyone from noticing that there is embedding data in motion vectors.
any hidden information at all. 4. Text Steganography: Hiding data
Key Concepts: within text by altering formatting,
Carrier File: The file in which the adding invisible characters, or
secret information is hidden (e.g., making changes that are hard to
image, audio, video). detect (e.g., spacing, font size).
Payload: The actual secret message Use Cases:
or data being concealed. Covert Communication: Secretly
Embedding Method: The technique sending messages without raising
used to hide the secret data inside suspicion.
the carrier file without altering its Watermarking: Embedding
appearance or usability. ownership or copyright information
Common Types of Steganography: within digital media to prove
1. Image Steganography: Hiding data authenticity.
within images by altering pixel Data protection :
values, typically using techniques
Q) Electronic data interchange ->
Electronic Data Interchange (EDI) is 4. Cost Savings: By eliminating paper-
the electronic exchange of business based processes and reducing
documents and data between manual input, EDI minimizes errors
organizations in a standardized and administrative costs.
format. It enables companies to send 5. Security: EDI provides secure
and receive information such as methods of transmitting business
purchase orders, invoices, shipping data, ensuring that sensitive
notices, and other business information is protected.
documents directly between their Common EDI Documents:
computer systems, without the need Purchase Orders: Requesting
for manual intervention or paper- products or services.
based communication. Invoices: Billing for goods or services
Key Features of EDI: rendered.
1. Standardization: EDI uses specific Shipping Notices: Communicating
standards (such as ANSI X12, shipment details and tracking
EDIFACT) to ensure that the format information.
of the exchanged data is consistent Payment Transactions: Facilitating
and interpretable by both parties. electronic payments.
2. Automation: The exchange of data is Benefits of EDI:
automated, allowing businesses to Increased Accuracy: Fewer errors
communicate directly between their due to the elimination of manual
systems, reducing the need for data entry.
manual data entry. Improved Efficiency: Streamlined
3. Speed and Efficiency: EDI reduces business processes and faster
processing times for transactions transaction times.
and eliminates delays associated
with postal mail or fax.