Study of Information Hiding Techniques and their Counterattacks: A Review Article

Abstract

With the rapid development of the internet technologies, digital media needs to be transmitted conveniently over the network. Attacks, unauthorized access of the information over the network become greater issues now a day. Information Hiding provides solution to these issues. In this paper, we studied the various exist-ing information hiding techniques like steganography, watermarking etc. An overview of steganalysis attack is also presented in this paper. Steganography tools used for the purpose of information hiding are also dis-cussed.

Authors and Affiliations

Rajkumar Yadav

Keywords

Related Articles

Developments in Indoor Optical Fiber Wireless Networks

Optical wireless is an innovative technology combining the mobility of radio frequency (RF) wireless communications with the high bandwidth availability of optical communications. Next generation of wireless communicatio...

Collision Avoidance Radar Operated LC Substrate based MSP Antenna in Vehicular Systems

Road safety and precautionary measurement based instruments became part and parcel of the modern vehicular systems. Collision avoidance helps to prevent the vehicles from accidents and from unnecessary collision while th...

PoWer: Polar Wavelet-Gaussian Filter for ring artifact suppression in CT Imaging Systems

In X-ray Computerized Tomography (CT), ring artifacts are caused by imperfect detector elements as well as by defects or impurities on the scintillator crystals. They appear on CT images as a number of dark concentric ri...

Intrusion Detection System Based on 802.11 Specific Attacks

Intrusion Detection Systems (IDSs) are a major line of defense for protecting network resources from illegal penetrations. A common approach in intrusion detection models, specifically in anomaly detection models, is to...

Download PDF file
  • EP ID EP129714
  • DOI -
  • Views 111
  • Downloads 0

How To Cite

Rajkumar Yadav (2011). Study of Information Hiding Techniques and their Counterattacks: A Review Article. International Journal of Computer Science and Communication Networks, 1(2), 142-164. https://europub.co.uk./articles/-A-129714