5 research outputs found

    Steganography and Steganalysis : Different Approaches

    Get PDF
    Steganography is the technique of hiding confidential information within any media. Steganography is often confused with cryptography because the two are similar in the way that they both are used to protect confidential information. The difference between the two is in the appearance in the processed output; the output of steganography operation is not apparently visible but in cryptography the output is scrambled so that it can draw attention. Steganlysis is process to detect of presence of steganography. In this article we have tried to elucidate the different approaches towards implementation of steganography using ‘multimedia’ file (text, static image, audio and video) and Network IP datagram as cover. Also some methods of steganalysis will be discussed

    A Modified Hybrid Port Knocking Technique for Host Authentication A Review

    Get PDF
    The main objective is to develop and assess the performance of a replacement PK technique, which may avert all kinds of port attacks and meets all network security necessities. Port knock is a crucial conception to secure services provided by the servers. By a predefined port knock sequence server establish whether or not the request could be a legitimate request for a service. The new technique uti lizes three acknowledge ideas, these are: port - knocking (PK), steganography, and mutual authentication, therefore, it mentioned because the hybrid port - knocking (HPK) technique. It are often used for host authentication to form native services invisible from port scanning, giv e an additional layer of security. During this paper presents analyzing the network sec urity concept of Port knock and assess their quality as firewall authentication mechanisms for gap network ports or activity bound actions on servers. This paper is developing and evaluating the performance of a replacement proposed modified hybrid port kn ock (MHPK) technique with proposed encryption/decryption technique. The planned technique is to stop completely different - different kinds of port attack and fulfill the complete security demand for network. Planned technique is that the combination of 4 i deas, this are port knocks (PK), symmetric key encryption/decryption, steganography and mutual authentication. Primarily it the improved modification of hybrid port knocking therefore; it observed because the modified hybrid port - knocking (MHPK) technique

    Towards a data publishing framework for primary biodiversity data: challenges and potentials for the biodiversity informatics community

    Get PDF
    Background: Currently primary scientific data, especially that dealing with biodiversity, is neither easily discoverable nor accessible. Amongst several impediments, one is a lack of professional recognition of scientific data publishing efforts. A possible solution is establishment of a ‘Data Publishing Framework’ which would encourage and recognise investments and efforts by institutions and individuals towards management, and publishing of primary scientific data potentially on a par with recognitions received for scholarly publications. Discussion: This paper reviews the state-of-the-art of primary biodiversity data publishing, and conceptualises a ‘Data Publishing Framework’ that would help incentivise efforts and investments by institutions and individuals in facilitating free and open access to biodiversity data. It further postulates the institutionalisation of a ‘Data Usage Index (DUI)’, that would attribute due recognition to multiple players in the data collection/creation, management and publishing cycle. Conclusion: We believe that institutionalisation of such a ‘Data Publishing Framework’ that offers socio-cultural, legal, technical, economic and policy environment conducive for data publishing will facilitate expedited discovery and mobilisation of an exponential increase in quantity of ‘fit-for-use’ primary biodiversity data, much of which is currently invisible
    corecore