Briefly describe known cover attack and known message attack.

What will be an ideal response?


ANSWER: • Known cover attack—Used when the cover-media, the original file with no hidden message, and the stego-media, the converted cover-media file that stores the hidden message, are available for analysis. By analyzing the original and steganography files, further comparisons can be made to identify common patterns that might help decipher the message.
• Known message attack—Used when the hidden message is revealed later, allowing further analysis of new messages. Similar to the known cover attack, this method uses comparative analysis to decipher the message. Because the message is known, deciphering it takes less effort.

Computer Science & Information Technology

You might also like to view...

All of the following are menu categories in Flash EXCEPT ____.

A. File B. Animate C. Insert D. Help

Computer Science & Information Technology

What is the most common type of hyperlink?

A) Text link B) Video link C) Graphic link D) Web link

Computer Science & Information Technology

Which high-availability option for DHCP should you configure if you want a DHCP server to operate in hot standby mode without having to configure shared storage?

A. DHCP failover B. DHCP split scope C. DHCP load balancing D. DHCP server cluster

Computer Science & Information Technology

Sharing workbooks allows users to view and scroll worksheets side by side. _________________________

Answer the following statement true (T) or false (F)

Computer Science & Information Technology