In the internet world, some of the information exchange required services defined in the security services X.800. Confidentiality of sensitive data is considered to be one of the security service defined in X.800 which is highly desirable in digital world. Encoding the sensitive information with the help of secret keys helps in maintaining the confidentiality of data. This approach is known as cryptography. The major limitation of cryptographic approaches lies in the fact that the encoding message which was or were produced as output after encryption procedure may attract malicious user on communication channels. They may launch brute force attacks or practice cryptanalysis. This limitation of cryptographic approaches is taken care by steganographic approach. Through steganographic approach one can conceal secret information into carrier. Carrier may be text, audio, image or video. The major limitation of steganography lies in the fact that, if any how steganalyst may aware about the fact that something is concealing in the carrier then purpose of steganography is defeated.
"synopsis" may belong to another edition of this title.
Seller: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Germany
Taschenbuch. Condition: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -In the internet world, some of the information exchange required services defined in the security services X.800. Confidentiality of sensitive data is considered to be one of the security service defined in X.800 which is highly desirable in digital world. Encoding the sensitive information with the help of secret keys helps in maintaining the confidentiality of data. This approach is known as cryptography. The major limitation of cryptographic approaches lies in the fact that the encoding message which was or were produced as output after encryption procedure may attract malicious user on communication channels. They may launch brute force attacks or practice cryptanalysis. This limitation of cryptographic approaches is taken care by steganographic approach. Through steganographic approach one can conceal secret information into carrier. Carrier may be text, audio, image or video. The major limitation of steganography lies in the fact that, if any how steganalyst may aware about the fact that something is concealing in the carrier then purpose of steganography is defeated. 80 pp. Englisch. Seller Inventory # 9786138967415
Seller: Books Puddle, New York, NY, U.S.A.
Condition: New. Seller Inventory # 26394695075
Seller: Majestic Books, Hounslow, United Kingdom
Condition: New. Print on Demand. Seller Inventory # 401682044
Seller: moluna, Greven, Germany
Condition: New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. Autor/Autorin: Singh Dr. Vineet KumarDr. Vineet Kumar Singh awarded PhD in Computer Science Engineering from Mahrshi University of Information Technology, Lucknow, Mtech from AIET Gautam Budh Technical University, Lucknow, Btech from Institute of. Seller Inventory # 559295035
Seller: Biblios, Frankfurt am main, HESSE, Germany
Condition: New. PRINT ON DEMAND. Seller Inventory # 18394695081
Seller: buchversandmimpf2000, Emtmannsberg, BAYE, Germany
Taschenbuch. Condition: Neu. Neuware -In the internet world, some of the information exchange required services defined in the security services X.800. Confidentiality of sensitive data is considered to be one of the security service defined in X.800 which is highly desirable in digital world. Encoding the sensitive information with the help of secret keys helps in maintaining the confidentiality of data. This approach is known as cryptography. The major limitation of cryptographic approaches lies in the fact that the encoding message which was or were produced as output after encryption procedure may attract malicious user on communication channels. They may launch brute force attacks or practice cryptanalysis. This limitation of cryptographic approaches is taken care by steganographic approach. Through steganographic approach one can conceal secret information into carrier. Carrier may be text, audio, image or video. The major limitation of steganography lies in the fact that, if any how steganalyst may aware about the fact that something is concealing in the carrier then purpose of steganography is defeated.VDM Verlag, Dudweiler Landstraße 99, 66123 Saarbrücken 80 pp. Englisch. Seller Inventory # 9786138967415
Seller: AHA-BUCH GmbH, Einbeck, Germany
Taschenbuch. Condition: Neu. nach der Bestellung gedruckt Neuware - Printed after ordering - In the internet world, some of the information exchange required services defined in the security services X.800. Confidentiality of sensitive data is considered to be one of the security service defined in X.800 which is highly desirable in digital world. Encoding the sensitive information with the help of secret keys helps in maintaining the confidentiality of data. This approach is known as cryptography. The major limitation of cryptographic approaches lies in the fact that the encoding message which was or were produced as output after encryption procedure may attract malicious user on communication channels. They may launch brute force attacks or practice cryptanalysis. This limitation of cryptographic approaches is taken care by steganographic approach. Through steganographic approach one can conceal secret information into carrier. Carrier may be text, audio, image or video. The major limitation of steganography lies in the fact that, if any how steganalyst may aware about the fact that something is concealing in the carrier then purpose of steganography is defeated. Seller Inventory # 9786138967415
Seller: preigu, Osnabrück, Germany
Taschenbuch. Condition: Neu. Evaluating Role of DNA and Kamla Approach in Metamorphic Cryptography | Vineet Kumar Singh (u. a.) | Taschenbuch | Englisch | 2021 | Scholars' Press | EAN 9786138967415 | Verantwortliche Person für die EU: preigu GmbH & Co. KG, Lengericher Landstr. 19, 49078 Osnabrück, mail[at]preigu[dot]de | Anbieter: preigu. Seller Inventory # 121148244