2020
DOI: 10.5815/ijmsc.2020.04.05
|View full text |Cite
|
Sign up to set email alerts
|

Comparative Analysis of Steganography Technique for Information Security

Abstract: Organisations need information security to reduce the risk of unauthorized information disclosure, use, modification and destruction. To avoid this risk and ensure security diverse solutions are available such as Cryptography, Steganography and Watermarking. Encryption changes the form of information but latter two hide records or watermark in some medium. This paper is an effort to explore one of the solutions i.e. Steganography. It is a mechanism of hiding secret information in text, image, audio or video ca… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 9 publications
0
3
0
Order By: Relevance
“…Only 36.7% of respondents said that they considered their income level to be in line with their idea of middle-class income. This situation proves the fact that the vast majority of middle-class professions in Ukraine consider themselves to belong to the appropriate stratum of society not on monetary but on sociological grounds [9]. In other words, there is an indirect identification of the middle class with the intelligentsia with its inherent functions and way of life.…”
Section: Advances In Economics Business and Management Research Volume 170mentioning
confidence: 90%
“…Only 36.7% of respondents said that they considered their income level to be in line with their idea of middle-class income. This situation proves the fact that the vast majority of middle-class professions in Ukraine consider themselves to belong to the appropriate stratum of society not on monetary but on sociological grounds [9]. In other words, there is an indirect identification of the middle class with the intelligentsia with its inherent functions and way of life.…”
Section: Advances In Economics Business and Management Research Volume 170mentioning
confidence: 90%
“…Additionally, the anti-aliasing function and type of wavelet from the DWT family are also selected by the user. The simulation time depends upon the sampling frequency, wavelet type, and the number of levels required [12,13].…”
Section: Discrete Wavelet Transformationmentioning
confidence: 99%
“…That is, by the information security of Ukraine, we mean the corresponding state of security of the information space of our state, while special operations and acts of external aggression with information connotations, unauthorized access, and theft of information through the use of special technical means, cybercrime and similar destructive actions do not cause tangible damage to the interests of the country [3, p. 124; 4]. Thus, we can say that the information security [5,6] of the state is a set of effective mechanisms and measures of state bodies authorized to take appropriate actions in the information sphere, and their purpose is to protect the national security of the state (in our case, Ukraine).…”
Section: The сOncept Of Cybersecurity and Its Implications For The Aviation Sectormentioning
confidence: 99%