?
List and explain the five steganalysis methods described by Neil F. Johnson and Sushil Jajodia.
What will be an ideal response?
Neil F. Johnson and Sushil Jajodia described these steganalysis methods ("attacks"):?• Stego-only attack-Used when only the ?le containing the possible steganography content is available for analysis; it's similar to a cyphertext attack. This attack is one of the most dif?cult to perform because all you have to analyze is the suspected steganography ?le.?• Known cover attack-Used when the cover-media, the original ?le with no hidden message, and the stego-media, the converted cover-media ?le that stores the hidden message, are available for analysis. By analyzing the original and steganography ?les, further comparisons can be made to identify common patterns that might help decipher the message.?• Known message attack-Used when the hidden message is revealed later, allowing further analysis of new messages. Similar to the known cover attack, this method uses comparative analysis to decipher the message. Because the message is known, deciphering it takes less effort.?• Chosen stego attack-Used when a steganography tool and stego-media were used to hide the message content. Because this method uses a known steganography tool, the analyst applies password or passphrase recovery techniques to decipher the message. • Chosen message attack-Used to identify corresponding patterns used in stego-media. This technique creates stego-media and then analyzes them to determine how data is con?gured in the ?le. The analyst then uses these known con?guration patterns to compare with suspected stego-media to determine what the message might be.
You might also like to view...
Match the following terms to their meanings:
I. Indexed A. The default field for sorting a table II. Primary key B. A property that creates a second and more efficient table III. Relationship that is quickly searched or sorted IV. Referential integrity C. The rules used maintain valid data in a relationship when V. Foreign key records are entered, edited, or deleted D. The related field in the second table in a relationship E. An association between two tables that is created by using a field common to both tables
Which of the following is the location of the command to start the web server?
a. /etc/httpd/conf b. /var/httpd/conf c. /etc/init.d/httpd start d. /dev/init.d/httpd start
Founded in ____, Yahoo! is an Internet portal and service provider and one of the earliest and most successful Internet start-up companies.
A. 1985 B. 1990 C. 1995 D. 2000
A(n) ____________________ is a random alphanumeric string generated by the session_start() function.
Fill in the blank(s) with the appropriate word(s).