Which technology is used to hide data in other data, such as hiding program code in a graphic image
(a) encryption (b) steganography (c) tunneling (d) spoofing
Which technology is used to cloke postulates in other postulates, such as shirking program regulation in a illustrative image
(a) encryption (b) steganography (c) tunneling (d) spoofing
b. steganography
steganography technology is used to cloke postulates in other postulates such as shirking regulation ina illustrative image