Steganography

List and explain five (5) examples of how steganography were used BEFORE the advent of computers.Discuss how steganography and encryption could be used legitimately, and why this could cause you a problem as a computer forensic examiner. Sample...