New and Unconventional Techniques in Pictorial Steganography and Steganalysis
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2013, Vol 14, Issue 3
Abstract
Steganography involves transferring data through a given channel in such a way that the communication channel itself is hidden from all involved parties. It is a form of security through obscurity; this technique protects both messages and stations involved in communication. In the most modern form of digital steganography, electronic communication may include complex steganographic lines of code inside transport layer which accomplishes the aforementioned task of protecting data and anonymity of participating stations. Steganography is much confused with the term cryptography former is fundamentally different in the sense that the message is sent secretly without attracting any attention of third party intruders by protecting anonymity of involved channels, nodes and stations
Authors and Affiliations
Vikas Kothari
Intrusion Detection System Based on K-Star Classifier and Feature Set Reduction
Network security and Intrusion Detection Systems (IDS’s) is an important security related research area. This paper applies K-star algorithm with filtering analysis in order to build a network intrusion detection...
A way of managing data center networks
Evolutionary changes have occurred throughout the various elements of the data centre, starting with server and storage virtualization and also network virtualization. Motivations for server virtualization were...
Comprehensive Survey on Automatic Embedded Attendance System
Abstract: Keeping up the participation is vital in every one of the organizations for checking the execution of workers. Each foundation has its own particular strategy in and collecting attendance specific manner. Some...
Evaluation of Convertibility Issues Between IFPUG and Cosmic Function Points
Abstract: Software industry has matured with time, from small application of few lines of codes to software application of millions of lines of code. In the past few years, the concern of the industry regarding software...
Performance and Evaluation of Data Mining Techniques in Cancer Diagnosis
We analyze the breast Cancer data available from the WBC, WDBC from UCI machine learning with the aim of developing accurate prediction models for breast cancer using data mining techniques. Data mining has...