Please use this identifier to cite or link to this item: http://localhost:8081/xmlui/handle/123456789/12095
Full metadata record
DC FieldValueLanguage
dc.contributor.authorSingh, Avtar-
dc.date.accessioned2014-11-29T06:22:36Z-
dc.date.available2014-11-29T06:22:36Z-
dc.date.issued2009-
dc.identifierM.Techen_US
dc.identifier.urihttp://hdl.handle.net/123456789/12095-
dc.guideSingh, Kuldip-
dc.description.abstractData Hiding is a broad term. But instead of attempting to destroy any evidence of a security breach, Data Hiding looks to mask it. It is evidently widely known within the hacker community that the good guys have the toolsets and capabilities to shed light on their tracks, even despite efforts to cover them up. As such, many newer and more currently popular hacking tools and techniques involve the ability to mask or hide individual files and the data within those files. The number of scholarly papers on protecting against Anti-Forensic methods is greatly outnumbered by the number of websites about how to exploit the forensic process. Therefore, it would seem that perpetrators are working harder to subvert the system than academia is working to strengthen forensics. In this Dissertation entitled "Anti-Forensic Tool for Data Hiding Based on Multi-Layered Security Approach", a solution is proposed in which the scheme is proposed in which the data is first encrypted and then it is encoded into the image selected by the user. The proposed strategy is tested with various stego attacks and the result is analyzed that prove the security of the tool. The accuracy of the predictions has been compared with existing approaches and the predictions are validated using the standard dataset. The Anti-Forensic tool can further be extended to perform other functionalities like Artifact Wiping, Trail Obfuscation, etc. to make the tool.en_US
dc.language.isoenen_US
dc.subjectELECTRONICS AND COMPUTER ENGINEERINGen_US
dc.subjectANTI-FORENSIC TOOLen_US
dc.subjectDATA HIDINGen_US
dc.subjectMULTI-LAYERED SECURITYen_US
dc.titleANTI-FORENSIC TOOL FOR DATA HIDING BASED ON MULTI-LAYERED SECURITY. APPROACHen_US
dc.typeM.Tech Dessertationen_US
dc.accession.numberG14636en_US
Appears in Collections:MASTERS' THESES (E & C)

Files in This Item:
File Description SizeFormat 
ECDG14636.pdf2.77 MBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.