TAILIEUCHUNG - Study of information hiding techniques and their counterattacks: A review article

In this paper, we studied the various existing information hiding techniques like steganography, watermarking etc. An overview of steganalysis attack is also presented in this paper. Steganography tools used for the purpose of information hiding are also discussed. | ISSN:2249-5789 Rajkumar Yadav, International Journal of Computer Science & Communication Networks,Vol 1(2), 142-164 Study of Information Hiding Techniques and their Counterattacks: A Review Article Rajkumar Yadav Assistant Professor , , Rohtak rajyadav76@ Abstract With the rapid development of the internet technologies, digital media needs to be transmitted conveniently over the network. Attacks, unauthorized access of the information over the network become greater issues now a day. Information Hiding provides solution to these issues. In this paper, we studied the various existing information hiding techniques like steganography, watermarking etc. An overview of steganalysis attack is also presented in this paper. Steganography tools used for the purpose of information hiding are also discussed. Keywords: LSB method, Cryptography, Steganography, Watermarking 1. Introduction Information Hiding is a science which dates back to ancient times. It has been used by ordinary people, spies, ruler armies etc. down through ages. But digital data information is relatively very young. Information hiding for digital data is a highly multidisciplinary field that combines images and signal processing with cryptography, communication theory, coding theory, signal compression and the theory of visual perception. The reason for the tremendous recent interest in this field is quite understandable because of the wide spectrum of applications it addresses. Secure communications, proof of ownership, authentication, software piracy and data embedding are some of the examples of its applications. Until recently, information hiding techniques received very much less attention from the research community and from industry than cryptography, but this has changed rapidly [1]. The search of a safe and secret manner of communication is very important now a days, not only for military purposes, but also for commercial goal related to the market strategy as well as

TỪ KHÓA LIÊN QUAN
TAILIEUCHUNG - Chia sẻ tài liệu không giới hạn
Địa chỉ : 444 Hoang Hoa Tham, Hanoi, Viet Nam
Website : tailieuchung.com
Email : tailieuchung20@gmail.com
Tailieuchung.com là thư viện tài liệu trực tuyến, nơi chia sẽ trao đổi hàng triệu tài liệu như luận văn đồ án, sách, giáo trình, đề thi.
Chúng tôi không chịu trách nhiệm liên quan đến các vấn đề bản quyền nội dung tài liệu được thành viên tự nguyện đăng tải lên, nếu phát hiện thấy tài liệu xấu hoặc tài liệu có bản quyền xin hãy email cho chúng tôi.
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.