This article was automatically translated from the original Turkish version.

Steganography is a data hiding method that enables the transmission of information by concealing its presence within another piece of data. The term originates from Ancient Greek, derived from the combination of steganós (covered) and graphḗ (writing), meaning "covered writing." Unlike cryptography, which aims to conceal the content of a message, steganography seeks to hide the very existence of the message.
Steganography is used between parties wishing to communicate secretly, ensuring that third parties remain unaware of the communication’s existence. The fundamental difference between steganography and cryptography lies in their approach: cryptography hides the message’s content through encryption, while steganography focuses on concealing the message’s presence. Steganography is generally not considered a cryptographic method because it does not involve encryption or key usage. While cryptography relies on the principle of confidentiality, steganography incorporates both confidentiality and deception techniques.
Steganography was first used in human history during Ancient Greece. According to Herodotus, during the Persian Wars, a secret message was tattooed onto a messenger’s scalp and delivered to the intended recipient only after the messenger’s hair had regrown. During the Middle Ages, the technique became more sophisticated with the use of invisible ink and coded scripts. In the late 15th century, Johannes Trithemius’s work Steganographia was regarded as one of the earliest systematic approaches in this field. Throughout the Renaissance and Modern periods, steganography evolved through techniques such as embedding messages in musical notation, Morse code, and invisible ink.
With the advent of the digital age, steganography has reached more sophisticated forms and became applicable to audio, image, and video files due to advances in computer technology. Since the late 20th century, it has also been employed in applications such as digital rights management, authentication, and copyright protection.
Steganography can be implemented through various media and techniques:
These techniques are typically selected based on the nature of the carrier data. For example, color intensity manipulation is feasible in image files, while frequency band manipulation is used in audio files.
Historically, steganography was primarily used in military and intelligence operations to transmit secret messages. Today, with the advancement of digital technologies, its applications have expanded across multiple disciplines.

Historical Development
Basic Methods of Steganography
Applications of Steganography