Research Article | Open Access | Download PDF
Volume 10 | Number 1 | Year 2014 | Article Id. IJCTT-V10P105 | DOI : https://doi.org/10.14445/22312803/IJCTT-V10P105
Information Hiding and Attacks : Review
Richa Gupta
Citation :
Richa Gupta, "Information Hiding and Attacks : Review," International Journal of Computer Trends and Technology (IJCTT), vol. 10, no. 1, pp. 21-24, 2014. Crossref, https://doi.org/10.14445/22312803/IJCTT-V10P105
Abstract
Information Hiding is considered very important part of our lives. There exist many techniques for securing the information. This paper briefs on the techniques for information hiding and the potential threats to those methods. This paper briefs about cryptanalysis and stegananlysis, two methods for breaching into the security methods.
Keywords
information hiding, cryptanalysis, steganalysis
References
[1] http://en.wikipedia.org/wiki/Cryptanalysis
[2] http://searchsecurity.techtarget.com/definition/cryptanalysis
[3] http://math.colorado.edu/~hiba/crypto/cryptanalysis.html
[4] http://en.wikipedia.org/wiki/Steganalysis
[5]http://www.sans.org/reading-room/whitepapers/stenganography/steganalysis-detecting-hidden-information-computer-forensic-analysis-1014
[6] Shawn D. Dickman, “An Overview of Steganogrpahy”, JMU-INFOSEC-TR-2007-002.
[7] Prof. S.N Wawale, Prof A Dasgupta, “Review of Data Hiding Techniques”, International Journal for Advance Research in Engineering and Technology, Vol. 2, Issue II, Feb 2014
[8] Richa Gupta, Sunny Gupta, Anuradha Singhal, “Importance and Techniques of Information Hiding : A Review”, International Journal of Computer Trends and Technology {IJCTT), Vol 9, No.5, March 2014
[9] Sabu M Thampi, “Information Hiding Techniques : A Tutorial Review”, ISTE-STTP on Network Security & Cryptography, LBSCE 2004
[10] http://en.wikipedia.org/wiki/Watermark
[11] http://en.wikipedia.org/wiki/Steganography