Steganography: Securing Message in wireless network
Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2013, Vol 4, Issue 3
Abstract
Steganography is the process of hiding a secret message with in a cover medium. However eavesdropper may guess the embedding algorithm like least significant bit (LSB) replacement of Chan et al, 2004; Wang et al, 2001; Wu et al, 2005, LSB matching of Mielikainen, 2006, addition and/or subtraction of Andead wastfield, 2001; F. Huang et al in 2011, Exploiting Modification Direction by Zhang and Wang, 2006, Binary Space Partition by Tsai and Wang, 2007, modulus function of Chin et al, 2011 and thus can apply the respective extraction method to detect the secret message. So challenges lies in the methodologies of embedding message. Capacity, security and robustness are the services to be demanded by users. Again the true-positive rate of secret message detection by eavesdropper should be lessened by applying firm technique. Thirdly operating domain should be less sensitive to the noise, margin level of losses or alteration of data while communicating through unguided medium like wireless network, sensor network and cellular network. This paper will briefly discuss the steganographic methods and their experimental results explained in the survey paper of Niels Provos and Peter Honeyman to hide and seek message. Finally the proposed results and the directions for future works are addressed.
Authors and Affiliations
A H M Kamal
THE IMPROVEMENT OF THE STABILITY PROBLEM OF RESHA GENERATION PLANT IN JORDAN
This study, discuss the stability problem of Resha generation plant. The length of the transmission line which connect Resha with Haranah station, decrease the power transferred capacity that increase the risk of transie...
AN OVERVIEW OF CLOUD TESTING AS A SERVICE
Testing is an important process for software quality assurance. A cloud infrastructure creates significant new opportunities for software quality assurance and testing. Making the test infrastructure that directly repres...
An Algorithm to reduce End to End Delay AND Enhance the Quality of Service in Mobile Adhoc Network
A mobile adhoc network (MANET) is formed by a group of wireless mobile hosts or nodes without any fixed infrastructure. As there is no inner control in a MANET, a mobile node itself acts as a router. Undoubtedly, MANETs...
Test Case Selection and Prioritization for Regression Testing using Fault Severity
Regression testing is a significant but a very expensive testing process .Test case prioritization is a technique to schedule and execute the test cases in such an order that results in increasing their ability to meet s...
Service-Oriented Architecture In Automation Industries
This paper addresses issues and difficulties in the advancement of cutting edge installed gadgets, applications and its administration that Service-Oriented Architecture (SOA) handles in Automation Industries (AI).Becaus...