Information Security Through Steganography Using TCP/IP Header Fields

Provided by: Creative Commons
Topic: Security
Format: PDF
"In today's world internet users frequently transfers the private information over the internet. This information is vulnerable to attacks from hackers or the malicious users who can use this information. For security of the information one can use encryption algorithms. A major drawback of this method is that the existence of the data is not hidden. Data that has been encrypted, although unreadable, still exists as data. With current tremendous pace in network technology growth, there is high need of the protection system for the data flowing on internet."

Find By Topic