Download now Free registration required
Digital watermarking techniques are used for authentication. Embedding and decoding tasks are performed in the watermarking. The watermark embedding process embeds the watermark bits into the carrier signal. Watermark decoder process detects and extracts any watermark bits from the carrier signal. Attack packets are passed through a set of intermediate nodes. Chain of compromised hosts acting as "Stepping stones". Attack detection system detects stepping-stone connections at the compromised hosts. Encryption and perturbation methods are used to increase the complexity of the detection systems. The survey is carried out under Stepping stone analysis, Encrypted packet analysis, Time perturbation model and Inter Packet Delay analysis model.
- Format: PDF
- Size: 329.52 KB