Study of Information Hiding Techniques and their Counterattacks: A Review Article
Journal Title: International Journal of Computer Science and Communication Networks - Year 2011, Vol 1, Issue 2
Abstract
With the rapid development of the internet technologies, digital media needs to be transmitted conveniently over the network. Attacks, unauthorized access of the information over the network become greater issues now a day. Information Hiding provides solution to these issues. In this paper, we studied the various exist-ing information hiding techniques like steganography, watermarking etc. An overview of steganalysis attack is also presented in this paper. Steganography tools used for the purpose of information hiding are also dis-cussed.
Authors and Affiliations
Rajkumar Yadav
Hardware/Software Co-design using Primitive Interface
Most engineering designs can be viewed as systems, i.e., as collections of several components whose combined operation provides useful services. Components can be heterogeneous in nature and their interaction may b...
Regeneration of ZVS Converter with Resonant Inductor
This paper presents an analysis of the regeneration of zero-voltages witching converter with resonant inductor, quasi-resonant converters, and full-bridge zero-voltage-switched PWM Converter. The design of a clamping cir...
PoWer: Polar Wavelet-Gaussian Filter for ring artifact suppression in CT Imaging Systems
In X-ray Computerized Tomography (CT), ring artifacts are caused by imperfect detector elements as well as by defects or impurities on the scintillator crystals. They appear on CT images as a number of dark concentric ri...
A Similar Structure Block Prediction for Lossless Image Compression
In image compression the main challenge is to efficiently encode and represent high frequency image structural components such as patterns, edges and textures. In this work, we develop an efficient image co...