A ________________ tool permits security professional or a hacker to embed hidden data within a carrier file like an image or video which can later be extracted from them.
(a) Cryptography
(b) Tomography
(c) Chorography
(d) Steganography
This question was addressed to me by my college director while I was bunking the class.
My question is from Cryptography in division Cryptography in Security of Cyber Security