Found 1862 Articles for Data Structure

What are the advantage and disadvantage of Steganography?

Ginni
Updated on 14-Mar-2022 07:31:31

6K+ Views

Steganography is an approach that simplify hiding of a message that is to be maintain secret within other message. This result is the secrecy of the hidden message itself. Steganography approach can be used to images, a video file or an audio file.The use of steganography such as watermarking which hides copyright data inside a watermark by overlaying document not easily invented by the naked eye. This avoids fraudulent actions and provides copyright secured media more protection.Advantage of SteganographyThe advantage of steganography is as follows −The advantage of steganography is that messages do not send consideration to themselves. Clearly detectable ... Read More

What are the technique of Frequency domain watermarking?

Ginni
Updated on 14-Mar-2022 07:28:45

895 Views

The main goals of frequency domain watermarking is to embed the watermarks in the spectral coefficients of the image. The most generally used transforms are the Discrete Cosine Transform (DCT), Discrete Fourier Transform (DFT), and Discrete Wavelet Transform (DWT).The main reason for watermarking in the frequency domain is that the nature of the human visual system (HVS) are better acquired by the spectral coefficients.Discrete cosine transforms (DCT) − DCT like a Fourier Transform. It can define data in terms of frequency space instead of an amplitude space. This is beneficial because that corresponds more to the method humans perceive light, ... Read More

What is HMAC in Information Security?

Ginni
Updated on 14-Mar-2022 07:28:56

2K+ Views

HMAC stands for Keyed-Hashing for Message Authentication. It is a message authentication code acquired by running a cryptographic hash function (such as MD5, SHA1, and SHA256) over the information (to be authenticated) and a shared secret key. HMAC is defined in RFC 2104.HMACs are same as digital signatures. They both provide integrity and authenticity. They both need cryptography keys and they both apply hash functions. The major difference is that digital signatures need asymmetric keys, while HMACs need symmetric keys (no public key).HMAC can be used in sequence with some iterated cryptographic hash function. MD5 and SHA-1 are instance of ... Read More

How Does a Message Authentication Code Work?

Ginni
Updated on 14-Mar-2022 07:24:19

667 Views

A message authentication code is a block of a few bytes that can be used to authenticate a message. The receiver can test this block and be definite that the message hasn't been changed by the third party.A family of cryptographic functions that is parameterized by a symmetric key. Each functions can facilitate on input data (known as “message”) of variable length to create an output value of a definite length. The output value is known as the MAC of the input message.An approved MAC algorithm is normal to satisfy the following property (for each of its provided security levels): ... Read More

What are the techniques of spatial domain watermarking?

Ginni
Updated on 14-Mar-2022 07:27:20

709 Views

The spatial domain define the image in the form of pixels. The spatial domain watermarking embeds the watermark by changing the intensity and the colour value of some preferred pixels.The spatial domain watermarking is simpler and its calculating speed is high than transform domain but it is less powerful against attacks. The spatial domain techniques can be simply used to any image.There are various techniques of spatial domain watermarking which are as follows −Least Significant Bit (LSB) − The LSB is the easiest spatial domain watermarking technique to insert a watermark in the least significant bits of some randomly selected ... Read More

What is MAC in Information Security?

Ginni
Updated on 14-Mar-2022 07:21:42

2K+ Views

MAC stands for Message Authentication Code. It is also defined as a tag. It is used to authenticate the origin and characteristics of a message. MACs use authentication cryptography to check the legitimacy of information sent through a network or shared from one person to another.MAC provides that the message is appearing from the correct sender, has not been modified, and that the information transferred over a network or saved in or outside a system is legitimate and does not include harmful code. MACs can be saved on a hardware security structure, a device used to handle responsive digital keys.A ... Read More

What are the application of Digital Watermarking?

Ginni
Updated on 14-Mar-2022 07:21:34

1K+ Views

There are various application of digital watermarking which are as follows −Broadcast Monitoring − Advertisers need to provide that they receive all of the air time which they buy from broadcasters. A non-technical approach in which human observation can be used to watch the broadcast and verify the originality by viewing or hearing is an error prone and expensive. Therefore, there should be an autorecognition system, which can save the identification codes to the broadcast.There are several techniques like cryptography that save the recognition code in the file header but the information is unlikely to survive any type of conversion ... Read More

What are the applications of RSA Algorithm?

Ginni
Updated on 14-Mar-2022 07:19:06

5K+ Views

There are some application of RSA Algorithm are as follows −RSA algorithm is asymmetric cryptography algorithm as it operate on two different keys such as public key and private key. The public key is likely to everyone, and private key remains private. The public key includes two numbers, one of which is a multiplication of two large prime numbers.The RSA algorithm is based on the complexity included in the factorization of large numbers. The RSA algorithm depends on the fact that there is no effective method to factor very large numbers. Therefore, it can deducing an RSA key would take ... Read More

What are the application of Steganography?

Ginni
Updated on 14-Mar-2022 07:14:06

3K+ Views

Steganography is also represented as the art and science of hiding data by embedding messages within apparently harmless messages. Steganography works by restoring bits of useless or unused information in regular computer files. This hidden data can be plaintext or ciphertext and even images.Steganography hides the covert message but not the fact that two parties are connecting with each other. The steganography procedure frequently includes locating a hidden message in some transport medium, known as the carrier.The secret message is embedded in the carrier to form the steganography channel. The need of a steganography key can be employed for encryption ... Read More

What are the security of RSA?

Ginni
Updated on 14-Mar-2022 07:12:32

3K+ Views

The security of RSA are as follows −Plain text attacks −The plain-text attacks are classified into three subcategories are as follows −Short message attack − In the short message attack, it can consider that attacker knows some blocks of plain text. If this assumption is true, the attackers can try encrypting each plain-text block to view if it results into the known cipher-text.Therefore, it can avoid this short-message attack, it is suggested that it can pad the plain text before encrypting it.Cycling attack −In this attacker suppose that the cipher text was acquired by doing some permutation on the plain-text ... Read More

Advertisements