Network Steganography and its Techniques: A Survey
نویسندگان
چکیده
منابع مشابه
Analysis of Image Steganography Techniques: A Survey
Steganography is the technique of hiding data in an appropriate multimedia carrier, e. g. , image, audio, and video files known as Cover. Images are mostly used as the cover medium due to their pervasiveness in different applications and representation with high redundancy. This paper provides a review and analysis of many existing methods for digital image steganography in the spatial as well ...
متن کاملA Survey on Image Steganography With its Related Techniques and its Types
Steganography is one of the methods of secret communication that hides the existence of hidden message. It can be defined as the study of invisible communication that usually deals with the ways of hiding the existence of the communicated message. The hidden message may be text, image, audio, video, etc. The files can be a cover image after inserting the message into the cover image using a ste...
متن کاملA Survey of State of the Art techniques of Steganography
Steganography is the science that involves communicating secret data in an appropriate multimedia carrier, e.g., image, audio, and video files. The main goal of steganography is to ensure that the transmitted message is completely masked, thereby ensuring that the message is accessible only to the intended receiver and not to any intruders or unauthorized parties. In steganography, rather than ...
متن کاملSteganography techniques
As cryptography is the standard way of ensuring privacy, integrity and confidentiality of a public channel, steganography steps in to provide even stronger assumptions. Thus, in the case of cryptology, an attacker cannot obtain information about the payload while inspecting its encrypted content. In the case of steganography, one cannot prove the existence of the covert communication itself. Th...
متن کاملSurvey on Techniques for Steganography of Audio Files
The rise and development of multimedia and digital information has made communication easier and quicker. However with digital information, comes a responsibility to communicate securely and effectively. As digital information is easy to distribute and alter, therefore it is prone to various attacks and threats. Various security measures are taken while dealing with digital information. Audio S...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Computer Applications
سال: 2017
ISSN: 0975-8887
DOI: 10.5120/ijca2017915319