Found 1862 Articles for Data Structure

What is Image Steganography in Information Security?

Ginni
Updated on 11-Mar-2022 11:17:38

223 Views

Images are the most famous cover objects used for steganography. In image steganography, pixel intensities are used to conceal the information. In the area of digital images, there are different image file formats exist, most of them for definite applications.An image is a set of numbers that constitute different light intensities in different location of the image. This numeric description forms a grid and the single points are defined as pixels. Most images on the Internet includes a rectangular map of the image’s pixels (defined as bits) where each pixel is situated and its colour. These pixels are shown horizontally ... Read More

What are the popular approaches of text steganography?

Ginni
Updated on 11-Mar-2022 11:14:37

369 Views

There are various approaches of text steganography which are as follows −Line Shift − In this method, secret message is private by vertically changing the text lines to some degree. A line decided has two clear control lines one on side of it for identifying the direction of movement of the marked line. It can hide bit 0, a line is changed up and to hide bit 1, the line is changed down.Determination of whether the line has been changed up or down is completed by computing the distance of the centroid of apparent line and its control lines. If ... Read More

What are the techniques of Text Steganography in Information Security?

Ginni
Updated on 11-Mar-2022 11:10:09

435 Views

Steganography is the art and science of concealing a message within another message without drawing some suspicion to others so that the message can only be identified by its intended recipient.There are various techniques of text steganography which are as follows −Line-shift coding − Features are marked into the text by changing the lines, so as to create recognition harder. Text lines are vertically changed for encoding. This can be used to either a format file or to the bitmap of a page.By transforming each second line of the document 1/300th of an inch up or down, line-shift encrypting provide ... Read More

What is Text Steganography in Information Security?

Ginni
Updated on 11-Mar-2022 11:07:55

3K+ Views

Text steganography is an approach of hiding secret text message within another text as a covering message or creating a cover message associated to the initial secret message.Text steganography can include anything from transforming the formatting of an existing text, to changing words within a text, to producing random character sequences or utilizing context-free grammars to make readable texts.Text steganography is held to be the trickiest because of deficiency of redundant data which is present in image, audio or a video file. The mechanism of text documents is identical with what it can identify, while in another types of documents ... Read More

How does Steganography works in Information Security?

Ginni
Updated on 11-Mar-2022 11:06:12

253 Views

Steganography is the art and science of connecting which hides the presence of the communication. The purpose of steganography is to convey a message to a receiver in such a method that the very presence of the message is indistinguishable by a third party.In the computer world, steganography means hiding secret messages in graphics, pictures, movie, or sound. At any cost, steganography secure from pirating copyrighted materials as well as aiding in unauthorized viewing.The advantage of steganography is to connect fast in an absolutely imperceptible aspect and to prevent drawing suspicion to the communication of a hidden record.Steganography hide the ... Read More

What are Steganography in information security?

Ginni
Updated on 11-Mar-2022 11:04:15

3K+ Views

Steganography is an approach that facilitates concealing of a message that is to be kept secret inside other message. This result is the concealment of the secret message itself.Steganography approach can be used to images, a video file or an audio file. Generally, however, steganography is written in characters such as hash marking, but its usage inside images is also common. At any rate, steganography secure from pirating possess materials as well as aiding in unauthorized viewing.One use of steganography such as watermarking which hides copyright data within a watermark by overlaying documents not simply detected by the naked eye. ... Read More

What is Cryptanalysis in Information Security?

Ginni
Updated on 11-Mar-2022 11:00:35

2K+ Views

Cryptanalysis is the decryption and inquiry of codes, ciphers or encrypted text. Cryptanalysis need numerical rule to search for algorithm susceptibility and divide into cryptography or information security systems.The main objective of cryptanalysis is to discover weaknesses in or otherwise defeat encryption algorithms. This research can be used by cryptographers to enhance and strengthen or else restore irreparably flawed algorithms.These type of attack exploits the nature of the algorithm to acquire the plaintext or the key being utilized from the encrypted message.Cryptanalysis generally require a direct examination of the cryptosystem in place, frequently an advanced focused mathematical effort at decryption ... Read More

What are the classification of security attacks in information security?

Ginni
Updated on 11-Mar-2022 10:57:15

2K+ Views

There are various classification of security attack is as follows −Cryptanalytic attacks − These attacks are combination of statistical and algebraic techniques objective at make sure the secret key of a cipher. These technique inspect the numerical properties of the cryptographic algorithms and aims at discovering distinguishers of the output distribution of cryptographic algorithms from the uniform distribution.Non-cryptanalytic attacks − Non-cryptanalytic attacks do not exploit the numerical weakness of the cryptographic algorithm. There are three objective of security are confidentiality, integrity and availability can be very much vulnerable by this type of attack.Attacks threatening confidentiality − Attacks threatening the confidentiality ... Read More

What are the substitution techniques in information security?

Ginni
Updated on 14-Sep-2023 01:37:03

35K+ Views

Substitution technique is a classical encryption approach where the characters present in the initial message are restored by the other characters or numbers or by symbols. If the plain text (original message) is treated as the string of bits, thus the substitution technique would restore bit pattern of plain text with the bit pattern of cipher text.There are various types of substitution ciphers which are as follows −Monoalphabetic Cipher − In monoalphabetic substitution cipher, a character in a plaintext is always restored or changed to the similar character in the ciphertext indifferent of its position in the text.For instance, if ... Read More

What are the types of security mechanism in information security?

Ginni
Updated on 11-Mar-2022 10:51:51

2K+ Views

There are various types of security mechanism which are as follows −Physical Security − Physical security define limiting access to key network resources by maintaining the resources behind a locked door and secured from natural and human-made disasters.Physical security can secure a network from unintended exploitation of network equipment by untrained faculty and contractors. It can also secure the network from hackers, competitors, and terrorists walking in off the street and changing equipment configurations.It is based on the level of protection, physical security can secure a network from terrorist and biohazard events, such as bombs, radioactive spills, etc. Physical security ... Read More

Advertisements