Due to the breakthrough of advanced technology namely digital signal processing including all kinds of digital media and the Internet a vast field has been opened up for steganographic purposes wherein a digitized data often includes redundant and unnoticed data spa... Lees meer.
This book described a generalized approach pertaining to essential concepts of steganographic techniques insight into the fundamentals. Steganographic techniques are illustrated using flow diagram algorithms and examples along with various parametric tests like PSNR... Lees meer.
Port scanning malicious hacking and the exploitation of web-based information systems vulnerabilities remains a clear and potent danger to communication and transactions on the World Wide Web. The situation is further complicated by the ubiquitous nature of the Intern... Lees meer.
Computer technology permeates every aspect our daily operations. As this dependence increases users become more susceptible to attacks. This threat comes largely from computer viruses which fall under the Information Warfare domain. Steganography s goal is to conceal... Lees meer.
This research work defines the various techniques used for information hiding their applications and also discusses the drawbacks of implementing those techniques independently. The motivation for this work includes provision of protection of information during transmi... Lees meer.
Steganography is used to hide information in some other medium to provide protection against detection. The success of a technique lies in changing the cover medium in a way that makes the change imperceptible for both the human and computer. A major limitation of stega... Lees meer.