Security in Computing
Investigator's Guide to Steganography
Investigator's Guide to Steganography
Digital Watermarking and Steganography
Digital Watermarking and Steganography
CEH Certified Ethical Hacker All-in-One Exam Guide
CEH Certified Ethical Hacker All-in-One Exam Guide
Hi-index | 0.00 |
The current methods of communication using steganography techniques involve the use of carrier files including network protocols. The current study presents a new method of communication using steganography techniques available today, the carrier being a ping. The study will also present the most effective ways of prevention against this form of secret communication.