2020
DOI: 10.1088/1757-899x/879/1/012028
|View full text |Cite
|
Sign up to set email alerts
|

Protecting Data By Socket Programming Steganography

Abstract: This paper aims to observe the techniques and methods of securing data using socket programming steganography. This work observes the development of the art of steganographic techniques which focus on computer network devices by visiting articles which published in journals and proceedings. The results obtained that the development of steganography is not only on data which stored on local disk, but also utilizes computer network devices to transmitting the data. Steganography techniques have several modificat… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 15 publications
0
1
0
Order By: Relevance
“…Cryptographic techniques hide messages by masking or scrambling messages that have other meanings or making the original messages meaningless. The advantage of steganography over cryptography is that the results of changing messages do not arouse suspicion (Handoko, Ardhianto, Hadiono, et al, 2020). To strengthen the security of information, the integration of Steganography and Cryptography has often been proposed.…”
Section: Introductionmentioning
confidence: 99%
“…Cryptographic techniques hide messages by masking or scrambling messages that have other meanings or making the original messages meaningless. The advantage of steganography over cryptography is that the results of changing messages do not arouse suspicion (Handoko, Ardhianto, Hadiono, et al, 2020). To strengthen the security of information, the integration of Steganography and Cryptography has often been proposed.…”
Section: Introductionmentioning
confidence: 99%