nerdexam
EC-CouncilEC-Council

312-49 · Question #474

312-49 Question #474: Real Exam Question with Answer & Explanation

The correct answer is C: Cover generation techniques. Cover generation techniques in steganography involve dynamically creating the cover medium (the carrier file) specifically to embed the secret message, rather than selecting a pre-existing file. This approach ensures the cover is purpose-built to conceal communication with minima

Submitted by amina.ke· Apr 18, 2026Computer Forensics Investigation Process

Question

Which of the following Steganography techniques allows you to encode information that ensures creation of cover for secret communication?

Options

  • ASubstitution techniques
  • BTransform domain techniques
  • CCover generation techniques
  • DSpread spectrum techniques

Explanation

Cover generation techniques in steganography involve dynamically creating the cover medium (the carrier file) specifically to embed the secret message, rather than selecting a pre-existing file. This approach ensures the cover is purpose-built to conceal communication with minimal statistical anomalies. Substitution techniques replace least-significant bits, transform domain techniques hide data in frequency domains (e.g., DCT in JPEG), and spread spectrum distributes the message across frequencies — but only cover generation creates the carrier itself as camouflage for the communication.

Topics

#Steganography#Cover Generation#Information Hiding#Secret Communication

Community Discussion

No community discussion yet for this question.

Full 312-49 PracticeBrowse All 312-49 Questions