Analysis of Exploit Delivery Technique using Steganography
نویسندگان
چکیده
منابع مشابه
analysis of ruin probability for insurance companies using markov chain
در این پایان نامه نشان داده ایم که چگونه می توان مدل ریسک بیمه ای اسپیرر اندرسون را به کمک زنجیره های مارکوف تعریف کرد. سپس به کمک روش های آنالیز ماتریسی احتمال برشکستگی ، میزان مازاد در هنگام برشکستگی و میزان کسری بودجه در زمان وقوع برشکستگی را محاسبه کرده ایم. هدف ما در این پایان نامه بسیار محاسباتی و کاربردی تر از روش های است که در گذشته برای محاسبه این احتمال ارائه شده است. در ابتدا ما نشا...
15 صفحه اولMulti-Segment Steganography Technique
The idea of this paper is to invent a new strategy in steganography to get the minimum effect on the images which is used to hide data into it. This is by dividing the original image into a number of segments, these segments is achieved according to the number of characters included into the message which is going to be hided into the original image. In this approach the message will be coded b...
متن کاملImage Steganography Optimization Technique
This paper presents a novel steganography technique which combines Discrete Cosine Transform (DCT) and Least Significant Bit (LSB). The objective is to maximize the capacity and invisibility of the secret image with minimal modification to the cover image (at most k-bits per block). The secret image is transformed to frequency domain using DCT. An algorithm is employed to construct the optimum ...
متن کاملSteganography using the Technique of Orderly Changing of Pixel Components
A new proposed scheme is presented for digital image steganography which is a kind of spatial domain technique, works with the orderly replacement of the pixel components with the text data that is to be embedded . Proposed work is concentrated on 8 bits of a pixel (8 bits of Red or Green or blue component of a pixel in a 24 bit image), resulting better image quality. The proposed scheme shows ...
متن کاملAn Overview of Image Steganography using LSB Technique
Steganography is the art of hiding the fact that communication is taking place, by hiding information in other information. Many different carrier file formats can be used, but digital images are the most popular because of their frequency on the Internet. For hiding secret information in images, there exists a large variety of steganographic techniques some are more complex than others and all...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Indian Journal of Science and Technology
سال: 2016
ISSN: 0974-5645,0974-6846
DOI: 10.17485/ijst/2016/v9i39/102075