Safe & Security Articles - Page 53 of 88

What are the requirement of Steganography?

Ginni
Updated on 11-Mar-2022 11:26:04

1K+ Views

Steganography is the art of concealing the fact that connection is taking place, by hiding data in other information. Some different carrier file structure can be used, but digital images are the important because of their frequency on the computer network.For concealing private data in images, there exists a huge method of steganographic approaches some are more difficult than others and some have specific powerful and weak points.There are several applications have multiple requirements of the steganography methods used. For instance, there are some software can needed absolute invisibility of the hidden information, while others needed a higher secret message ... Read More

What is Least significant bit algorithm in Information Security?

Ginni
Updated on 11-Mar-2022 11:23:48

5K+ Views

Least significant bit (LSB) insertion is a common and simple method to embed data in an image file. In this approach the LSB of a byte is restored with an M’s bit. This technique operate well for image steganography. For hiding data within the images, the LSB (Least Significant Byte) approach is generally used.An image file is a file that shows multiple colors and intensities of light on different location of an image. The best type of image files to hide data inside is a 24 Bit BMP (Bitmap) image.When an image is of large quality and resolution it is ... Read More

What are the types of Steganography?

Ginni
Updated on 11-Mar-2022 11:22:01

7K+ Views

Steganography is not only the art of hiding information but also hiding the element of transmission of secret information. Steganography hides the secret information in another file in such a method that only the recipient understand the existence of message.In ancient time, the data was secured by hiding it on the back of wax, scripting tables, and stomach of rabbits or on the scalp of the slaves. But today’s there are some people transmit the information in the form of text, images, video, and audio over the medium.It can be securely transmission of confidential information, the multimedia objects such as ... Read More

What are the methods of Image Steganography in Information Security?

Ginni
Updated on 11-Mar-2022 11:20:21

547 Views

Image steganography has truly state-of-the-art with the invention of quick, dynamic computers. Software is simply accessible for processing and hiding of data images. Images can also be recovered very simply.There are three main methods of information hiding in images which are as follows −Least Significant Bit Insertion − This is the most famous image steganography technique. It is simple, easy to make and also simply to use. Unfortunately, it is intensely vulnerable to attack. A simple conversion of structure can damage all hidden data.The best approach of image document to hide data inside is a 24 Bit BMP (Bitmap) image. ... Read More

What are the techniques of Text Steganography in Information Security?

Ginni
Updated on 11-Mar-2022 11:10:09

753 Views

Steganography is the art and science of concealing a message within another message without drawing some suspicion to others so that the message can only be identified by its intended recipient.There are various techniques of text steganography which are as follows −Line-shift coding − Features are marked into the text by changing the lines, so as to create recognition harder. Text lines are vertically changed for encoding. This can be used to either a format file or to the bitmap of a page.By transforming each second line of the document 1/300th of an inch up or down, line-shift encrypting provide ... Read More

How does Steganography works in Information Security?

Ginni
Updated on 11-Mar-2022 11:06:12

486 Views

Steganography is the art and science of connecting which hides the presence of the communication. The purpose of steganography is to convey a message to a receiver in such a method that the very presence of the message is indistinguishable by a third party.In the computer world, steganography means hiding secret messages in graphics, pictures, movie, or sound. At any cost, steganography secure from pirating copyrighted materials as well as aiding in unauthorized viewing.The advantage of steganography is to connect fast in an absolutely imperceptible aspect and to prevent drawing suspicion to the communication of a hidden record.Steganography hide the ... Read More

What are the classification of security attacks in information security?

Ginni
Updated on 21-Oct-2024 14:38:17

3K+ Views

There are various classification of security attack is as follows − Cryptanalytic attacks These attacks are combination of statistical and algebraic techniques objective at make sure the secret key of a cipher. These technique inspect the numerical properties of the cryptographic algorithms and aims at discovering distinguishers of the output distribution of cryptographic algorithms from the uniform distribution. Non-cryptanalytic attacks Non-cryptanalytic attacks do not exploit the numerical weakness of the cryptographic algorithm. There are three objective of security are confidentiality, integrity and availability can be very much vulnerable by this type of attack. Attacks threatening confidentiality Attacks threatening the confidentiality ... Read More

What are the substitution techniques in information security?

Ginni
Updated on 14-Sep-2023 01:37:03

54K+ Views

Substitution technique is a classical encryption approach where the characters present in the initial message are restored by the other characters or numbers or by symbols. If the plain text (original message) is treated as the string of bits, thus the substitution technique would restore bit pattern of plain text with the bit pattern of cipher text.There are various types of substitution ciphers which are as follows −Monoalphabetic Cipher − In monoalphabetic substitution cipher, a character in a plaintext is always restored or changed to the similar character in the ciphertext indifferent of its position in the text.For instance, if ... Read More

What are the types of security mechanism in information security?

Ginni
Updated on 11-Mar-2022 10:51:51

2K+ Views

There are various types of security mechanism which are as follows −Physical Security − Physical security define limiting access to key network resources by maintaining the resources behind a locked door and secured from natural and human-made disasters.Physical security can secure a network from unintended exploitation of network equipment by untrained faculty and contractors. It can also secure the network from hackers, competitors, and terrorists walking in off the street and changing equipment configurations.It is based on the level of protection, physical security can secure a network from terrorist and biohazard events, such as bombs, radioactive spills, etc. Physical security ... Read More

What are True Random Number Generation?

Ginni
Updated on 11-Mar-2022 10:46:58

4K+ Views

A true random number generator (TRNG) uses a nondeterministic source to make randomness. Most function by measuring unpredictable natural processes, including pulse detectors of ionizing radiation activities, gas discharge tubes, and leaky capacitors.Intel has developed a commercially accessible chip that samples thermal noise by developing the voltage measured across undriven resistors. TRNG generates a true random number and is produced generally by hardware method.Because the random number produced by TRNG is complex to predict because TRNG is generated based on a physical source that is complex to forecast a random value. Hence, the random number produced from TRNG is a ... Read More

Advertisements