Ginni has Published 1580 Articles

What are the technique of Frequency domain watermarking?

Ginni

Ginni

Updated on 14-Mar-2022 07:28:45

892 Views

The main goals of frequency domain watermarking is to embed the watermarks in the spectral coefficients of the image. The most generally used transforms are the Discrete Cosine Transform (DCT), Discrete Fourier Transform (DFT), and Discrete Wavelet Transform (DWT).The main reason for watermarking in the frequency domain is that the ... Read More

What are the techniques of spatial domain watermarking?

Ginni

Ginni

Updated on 14-Mar-2022 07:27:20

708 Views

The spatial domain define the image in the form of pixels. The spatial domain watermarking embeds the watermark by changing the intensity and the colour value of some preferred pixels.The spatial domain watermarking is simpler and its calculating speed is high than transform domain but it is less powerful against ... Read More

How Does a Message Authentication Code Work?

Ginni

Ginni

Updated on 14-Mar-2022 07:24:19

667 Views

A message authentication code is a block of a few bytes that can be used to authenticate a message. The receiver can test this block and be definite that the message hasn't been changed by the third party.A family of cryptographic functions that is parameterized by a symmetric key. Each ... Read More

What is MAC in Information Security?

Ginni

Ginni

Updated on 14-Mar-2022 07:21:42

2K+ Views

MAC stands for Message Authentication Code. It is also defined as a tag. It is used to authenticate the origin and characteristics of a message. MACs use authentication cryptography to check the legitimacy of information sent through a network or shared from one person to another.MAC provides that the message ... Read More

What are the application of Digital Watermarking?

Ginni

Ginni

Updated on 14-Mar-2022 07:21:34

1K+ Views

There are various application of digital watermarking which are as follows −Broadcast Monitoring − Advertisers need to provide that they receive all of the air time which they buy from broadcasters. A non-technical approach in which human observation can be used to watch the broadcast and verify the originality by ... Read More

What are the applications of RSA Algorithm?

Ginni

Ginni

Updated on 14-Mar-2022 07:19:06

5K+ Views

There are some application of RSA Algorithm are as follows −RSA algorithm is asymmetric cryptography algorithm as it operate on two different keys such as public key and private key. The public key is likely to everyone, and private key remains private. The public key includes two numbers, one of ... Read More

What are the application of Steganography?

Ginni

Ginni

Updated on 14-Mar-2022 07:14:06

3K+ Views

Steganography is also represented as the art and science of hiding data by embedding messages within apparently harmless messages. Steganography works by restoring bits of useless or unused information in regular computer files. This hidden data can be plaintext or ciphertext and even images.Steganography hides the covert message but not ... Read More

What are the security of RSA?

Ginni

Ginni

Updated on 14-Mar-2022 07:12:32

3K+ Views

The security of RSA are as follows −Plain text attacks −The plain-text attacks are classified into three subcategories are as follows −Short message attack − In the short message attack, it can consider that attacker knows some blocks of plain text. If this assumption is true, the attackers can try ... Read More

What are the techniques of Steganalysis?

Ginni

Ginni

Updated on 14-Mar-2022 07:09:48

2K+ Views

Steganalysis is the technology that tries to defeat steganography by detecting the hidden data and extracting or destroying it. Steganalysis is the procedure of detecting steganography by viewing at variances between bit patterns and unusually high file sizes. It is the art of finding and rendering meaningless covert messages.The main ... Read More

What is the uses of Steganography?

Ginni

Ginni

Updated on 11-Mar-2022 11:34:51

2K+ Views

Steganography is the art of hiding data and an effort to hide the existence of the embedded data. It serves as a superior method of securing message than cryptography which only hide the content of the message not the existence of the message.Original message is being unseen within a carrier ... Read More

Advertisements