International Journal of Computer
Trends and Technology

Research Article | Open Access | Download PDF

Volume 10 | Number 1 | Year 2014 | Article Id. IJCTT-V10P105 | DOI : https://doi.org/10.14445/22312803/IJCTT-V10P105

Information Hiding and Attacks : Review


Richa Gupta

Citation :

Richa Gupta, "Information Hiding and Attacks : Review," International Journal of Computer Trends and Technology (IJCTT), vol. 10, no. 1, pp. 21-24, 2014. Crossref, https://doi.org/10.14445/22312803/IJCTT-V10P105

Abstract

Information Hiding is considered very important part of our lives. There exist many techniques for securing the information. This paper briefs on the techniques for information hiding and the potential threats to those methods. This paper briefs about cryptanalysis and stegananlysis, two methods for breaching into the security methods.

Keywords

information hiding, cryptanalysis, steganalysis

References

[1] http://en.wikipedia.org/wiki/Cryptanalysis
[2] http://searchsecurity.techtarget.com/definition/cryptanalysis
[3] http://math.colorado.edu/~hiba/crypto/cryptanalysis.html
[4] http://en.wikipedia.org/wiki/Steganalysis
[5]http://www.sans.org/reading-room/whitepapers/stenganography/steganalysis-detecting-hidden-information-computer-forensic-analysis-1014
[6] Shawn D. Dickman, “An Overview of Steganogrpahy”, JMU-INFOSEC-TR-2007-002.
[7] Prof. S.N Wawale, Prof A Dasgupta, “Review of Data Hiding Techniques”, International Journal for Advance Research in Engineering and Technology, Vol. 2, Issue II, Feb 2014
[8] Richa Gupta, Sunny Gupta, Anuradha Singhal, “Importance and Techniques of Information Hiding : A Review”, International Journal of Computer Trends and Technology {IJCTT), Vol 9, No.5, March 2014
[9] Sabu M Thampi, “Information Hiding Techniques : A Tutorial Review”, ISTE-STTP on Network Security & Cryptography, LBSCE 2004
[10] http://en.wikipedia.org/wiki/Watermark
[11] http://en.wikipedia.org/wiki/Steganography