Study of Information Hiding Techniques and their Counterattacks: A Review Article
Journal Title: International Journal of Computer Science and Communication Networks - Year 2011, Vol 1, Issue 2
Abstract
With the rapid development of the internet technologies, digital media needs to be transmitted conveniently over the network. Attacks, unauthorized access of the information over the network become greater issues now a day. Information Hiding provides solution to these issues. In this paper, we studied the various exist-ing information hiding techniques like steganography, watermarking etc. An overview of steganalysis attack is also presented in this paper. Steganography tools used for the purpose of information hiding are also dis-cussed.
Authors and Affiliations
Rajkumar Yadav
Intrusion Detection System Based on 802.11 Specific Attacks
Intrusion Detection Systems (IDSs) are a major line of defense for protecting network resources from illegal penetrations. A common approach in intrusion detection models, specifically in anomaly detection models, is to...
Performance Analysis of ARQ Mechanisms in WiMAX Networks
WiMAX (Worldwide Interoperability for Microwave Access) is the IEEE 802.16 standards-based wireless technology, provides Broadband Wireless Access (BWA) for Metropolitan Area Networks (MAN). The Automatic Repeat reQuest...
A Similar Structure Block Prediction for Lossless Image Compression
In image compression the main challenge is to efficiently encode and represent high frequency image structural components such as patterns, edges and textures. In this work, we develop an efficient image co...
Fuzzy Clustering as an Intrusion Detection Technique
Intrusion detection and clustering have always been hot topics in the field of machine learning. Clustering as an intrusion detection technique has long before proved to be beneficial. But as the methods and types of att...