Study of Information Hiding Techniques and their Counterattacks: A Review Article
Journal Title: International Journal of Computer Science and Communication Networks - Year 2011, Vol 1, Issue 2
Abstract
With the rapid development of the internet technologies, digital media needs to be transmitted conveniently over the network. Attacks, unauthorized access of the information over the network become greater issues now a day. Information Hiding provides solution to these issues. In this paper, we studied the various exist-ing information hiding techniques like steganography, watermarking etc. An overview of steganalysis attack is also presented in this paper. Steganography tools used for the purpose of information hiding are also dis-cussed.
Authors and Affiliations
Rajkumar Yadav
Developments in Indoor Optical Fiber Wireless Networks
Optical wireless is an innovative technology combining the mobility of radio frequency (RF) wireless communications with the high bandwidth availability of optical communications. Next generation of wireless communicatio...
Collision Avoidance Radar Operated LC Substrate based MSP Antenna in Vehicular Systems
Road safety and precautionary measurement based instruments became part and parcel of the modern vehicular systems. Collision avoidance helps to prevent the vehicles from accidents and from unnecessary collision while th...
PoWer: Polar Wavelet-Gaussian Filter for ring artifact suppression in CT Imaging Systems
In X-ray Computerized Tomography (CT), ring artifacts are caused by imperfect detector elements as well as by defects or impurities on the scintillator crystals. They appear on CT images as a number of dark concentric ri...
Intrusion Detection System Based on 802.11 Specific Attacks
Intrusion Detection Systems (IDSs) are a major line of defense for protecting network resources from illegal penetrations. A common approach in intrusion detection models, specifically in anomaly detection models, is to...