New and Unconventional Techniques in Pictorial Steganography and Steganalysis

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2013, Vol 14, Issue 3

Abstract

 Steganography involves transferring data through a given channel in such a way that the communication channel itself is hidden from all involved parties. It is a form of security through obscurity; this technique protects both messages and stations involved in communication. In the most modern form of digital steganography, electronic communication may include complex steganographic lines of code inside transport layer which accomplishes the aforementioned task of protecting data and anonymity of participating stations. Steganography is much confused with the term cryptography former is fundamentally different in the sense that the message is sent secretly without attracting any attention of third party intruders by protecting anonymity of involved channels, nodes and stations

Authors and Affiliations

Vikas Kothari

Keywords

Related Articles

 Intrusion Detection System Based on K-Star Classifier and  Feature Set Reduction

 Network security and Intrusion Detection Systems (IDS’s) is an important security related research area. This paper applies K-star algorithm with filtering analysis in order to build a network intrusion detection...

 A way of managing data center networks

 Evolutionary changes have occurred throughout the various elements of the data centre, starting with server and storage virtualization and also network virtualization. Motivations for server virtualization were...

Comprehensive Survey on Automatic Embedded Attendance System

Abstract: Keeping up the participation is vital in every one of the organizations for checking the execution of workers. Each foundation has its own particular strategy in and collecting attendance specific manner. Some...

Evaluation of Convertibility Issues Between IFPUG and Cosmic Function Points

Abstract: Software industry has matured with time, from small application of few lines of codes to software application of millions of lines of code. In the past few years, the concern of the industry regarding software...

 Performance and Evaluation of Data Mining Techniques in  Cancer Diagnosis

 We analyze the breast Cancer data available from the WBC, WDBC from UCI machine learning with the aim of developing accurate prediction models for breast cancer using data mining techniques. Data mining  has...

Download PDF file
  • EP ID EP157144
  • DOI -
  • Views 105
  • Downloads 0

How To Cite

Vikas Kothari (2013).  New and Unconventional Techniques in Pictorial Steganography and Steganalysis. IOSR Journals (IOSR Journal of Computer Engineering), 14(3), 37-41. https://europub.co.uk/articles/-A-157144