Information Hiding and Attacks : Review

  IJCTT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© 2014 by IJCTT Journal
Volume-10 Number-1
Year of Publication : 2014
Authors : Richa Gupta
DOI :  10.14445/22312803/IJCTT-V10P105

MLA

Richa Gupta."Information Hiding and Attacks : Review". International Journal of Computer Trends and Technology (IJCTT) V10(1):21-24, April 2014. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract -
Information Hiding is considered very important part of our lives. There exist many techniques for securing the information. This paper briefs on the techniques for information hiding and the potential threats to those methods. This paper briefs about cryptanalysis and stegananlysis, two methods for breaching into the security methods.

References
[1] http://en.wikipedia.org/wiki/Cryptanalysis
[2] http://searchsecurity.techtarget.com/definition/cryptanalysis
[3] http://math.colorado.edu/~hiba/crypto/cryptanalysis.html
[4] http://en.wikipedia.org/wiki/Steganalysis
[5]http://www.sans.org/reading-room/whitepapers/stenganography/steganalysis-detecting-hidden-information-computer-forensic-analysis-1014
[6] Shawn D. Dickman, “An Overview of Steganogrpahy”, JMU-INFOSEC-TR-2007-002.
[7] Prof. S.N Wawale, Prof A Dasgupta, “Review of Data Hiding Techniques”, International Journal for Advance Research in Engineering and Technology, Vol. 2, Issue II, Feb 2014
[8] Richa Gupta, Sunny Gupta, Anuradha Singhal, “Importance and Techniques of Information Hiding : A Review”, International Journal of Computer Trends and Technology {IJCTT), Vol 9, No.5, March 2014
[9] Sabu M Thampi, “Information Hiding Techniques : A Tutorial Review”, ISTE-STTP on Network Security & Cryptography, LBSCE 2004
[10] http://en.wikipedia.org/wiki/Watermark
[11] http://en.wikipedia.org/wiki/Steganography

Keywords
information hiding, cryptanalysis, steganalysis