International Journal of Computer Applications
In this paper the authors describes about analyze the packet hiding methods. These methods are efficiently hiding the data packets while transferring in the network Medias. To protect the system from the unauthorized users, unauthorized programs, threaten the confidential matters and confirm the system availability to the legal users. The authors' need of network security has broken into two needs. One is the need of information security and other is the need of computer security. On internet or any network of an organization, thousands of important information is exchanged daily.