Multidisciplinary Approach to Modern Digital Steganography by Sabyasachi Pramanik;Mangesh Manikrao Ghonge;Renjith V. Ravi;Korhan Cengiz;
Author:Sabyasachi Pramanik;Mangesh Manikrao Ghonge;Renjith V. Ravi;Korhan Cengiz;
Language: eng
Format: epub
Publisher: IGI Global
The two important methodology for information protection in the IoT scenario are Cryptography and Steganography. While classical cryptography deals with concealing the message content, Steganography deals with covering the statistic that the secret information is actuality sent together with the message content. Mainly Steganography deals with walloping messages in a manner that the potential monitors are not even aware that the message has been sent. The word Steganography means âcovered writingâ deriving from Greekâ Steganographia (âstegosâ meaning âcoverâ and âgrafiaâ meaning âwritingâ) (Khosravi et al., 2011).In the past invisible ink or hidden tattoo were used for conveying steganography content but now a days different computer networks are used as communication channel in Steganography. Steganography process is depicted in Figure-3.
Figure 3. Steganography Process
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4135)
Ego Is the Enemy by Ryan Holiday(3999)
Offensive Shellcode from Scratch by Rishalin Pillay(3713)
Exploring Deepfakes by Bryan Lyon and Matt Tora(3320)
Robo-Advisor with Python by Aki Ranin(3112)
Learning C# by Developing Games with Unity 2021 by Harrison Ferrone(2885)
Speed Up Your Python with Rust by Maxwell Flitton(2861)
Agile Security Operations by Hinne Hettema(2816)
Liar's Poker by Michael Lewis(2815)
OPNsense Beginner to Professional by Julio Cesar Bueno de Camargo(2815)
Linux Command Line and Shell Scripting Techniques by Vedran Dakic and Jasmin Redzepagic(2814)
Extreme DAX by Michiel Rozema & Henk Vlootman(2801)
Essential Cryptography for JavaScript Developers by Alessandro Segala(2751)
Elevating React Web Development with Gatsby by Samuel Larsen-Disney(2742)
Python for ArcGIS Pro by Silas Toms Bill Parker(2659)
AI-Powered Commerce by Andy Pandharikar & Frederik Bussler(2653)
Cryptography Algorithms by Massimo Bertaccini(2637)
Incident Response Techniques for Ransomware Attacks by Oleg Skulkin(2635)
Distributed .NET with Microsoft Orleans by Bhupesh Guptha Muthiyalu Suneel Kumar Kunani(2635)