Study of Information Hiding Techniques and their Counterattacks: A Review Article

Abstract

With the rapid development of the internet technologies, digital media needs to be transmitted conveniently over the network. Attacks, unauthorized access of the information over the network become greater issues now a day. Information Hiding provides solution to these issues. In this paper, we studied the various exist-ing information hiding techniques like steganography, watermarking etc. An overview of steganalysis attack is also presented in this paper. Steganography tools used for the purpose of information hiding are also dis-cussed.

Authors and Affiliations

Rajkumar Yadav

Keywords

Related Articles

Intrusion Detection System Based on 802.11 Specific Attacks

Intrusion Detection Systems (IDSs) are a major line of defense for protecting network resources from illegal penetrations. A common approach in intrusion detection models, specifically in anomaly detection models, is to...

Performance Analysis of ARQ Mechanisms in WiMAX Networks

WiMAX (Worldwide Interoperability for Microwave Access) is the IEEE 802.16 standards-based wireless technology, provides Broadband Wireless Access (BWA) for Metropolitan Area Networks (MAN). The Automatic Repeat reQuest...

A Similar Structure Block Prediction for Lossless Image Compression

 In image compression the main challenge is to efficiently encode and represent high frequency image structural components such as patterns, edges and textures. In this work, we develop an efficient image co...

Fuzzy Clustering as an Intrusion Detection Technique

Intrusion detection and clustering have always been hot topics in the field of machine learning. Clustering as an intrusion detection technique has long before proved to be beneficial. But as the methods and types of att...

Download PDF file
  • EP ID EP129714
  • DOI -
  • Views 110
  • Downloads 0

How To Cite

Rajkumar Yadav (2011). Study of Information Hiding Techniques and their Counterattacks: A Review Article. International Journal of Computer Science and Communication Networks, 1(2), 142-164. https://europub.co.uk/articles/-A-129714