Briefly describe known cover attack and known message attack.
What will be an ideal response?
ANSWER: • Known cover attack—Used when the cover-media, the original file with no hidden message, and the stego-media, the converted cover-media file that stores the hidden message, are available for analysis. By analyzing the original and steganography files, further comparisons can be made to identify common patterns that might help decipher the message.
• Known message attack—Used when the hidden message is revealed later, allowing further analysis of new messages. Similar to the known cover attack, this method uses comparative analysis to decipher the message. Because the message is known, deciphering it takes less effort.
You might also like to view...
All of the following are menu categories in Flash EXCEPT ____.
A. File B. Animate C. Insert D. Help
What is the most common type of hyperlink?
A) Text link B) Video link C) Graphic link D) Web link
Which high-availability option for DHCP should you configure if you want a DHCP server to operate in hot standby mode without having to configure shared storage?
A. DHCP failover B. DHCP split scope C. DHCP load balancing D. DHCP server cluster
Sharing workbooks allows users to view and scroll worksheets side by side. _________________________
Answer the following statement true (T) or false (F)