Academic Journals Database
Disseminating quality controlled scientific knowledge

A Data Hiding Techniques Based on Length of English Text using DES and Attacks

ADD TO MY LIST
 
Author(s): Sanjay Jadhav | Viddhulata Mohite

Journal: International Journal of Research In Computer Science
ISSN 2249-8257

Volume: 2;
Issue: 4;
Start page: 23;
Date: 2012;
VIEW PDF   PDF DOWNLOAD PDF   Download PDF Original page

Keywords: Information hiding | DES | Encryption | Decryption

ABSTRACT
The comparing recent proposal for multimedia applications network security remains an important topic for researchers. The security deals with both wired and wireless communication. Network is defined as it is a large system consisting of many similar parts that are connected together to allow the movement or communication between or along the parts or between the parts and a control center. There are the main components of the network information system such as end systems (terminals, servers) and intermediate systems (hubs, switches, gateways). Every node has its own set of vulnerabilities that can be related to hardware, software, protocol stack etc. Nodes are interconnected by physical supports in a network for example connected with cables in wired Local Area Network (LAN) or radio waves (Wi-Fi) in Wireless Local Area Network (WLAN). Some nodes are able to provide services (FTP, HTTP browsing, database access). If two nodes want to communicate together, they must be interconnected physically and logically. Network security deals with also information hiding technique. Now day’s security deals with heterogeneous networks. The use of different wireless and wired network which are working on different platform is heterogeneous. So design of network security for such type of heterogeneous network is difficult task.

Tango Rapperswil
Tango Rapperswil

    
RPA Switzerland

RPA Switzerland

Robotic process automation