A REVIEW ON USE OF STEGANOGRAPHY FOR CYBER CRIME PREVENTION
Keywords:
Cyber crime,, Steganography, Cryptography,Abstract
The many forms of cybercrime are categorized here. Internet-based criminal activity, or "cyber crime," is distinct from traditional crime. This kind of crime encompasses a wide range of illegal conduct. The term "cyber crime" has been used to describe a broad category of illegal activity. Several unethical pursuits are carried out under this guise. The anonymity of the Internet has led to some terrible acts being committed in cyberspace recently. Many online users are abusing this service in egregious ways. While the internet has many beneficial applications, it may also be used for illegal purposes. In addition, this study summarizes various previous studies on the topic of cybercrime. Steganography and other forms of cryptography are employed to combat online criminal activity.
References
Abhishek Kumar Bharti, ”Detection of Session Hijacking and IP Spoofing Using Sensor Nodes and Cryptography”IOSR Journal of Computer Engineering (IOSRJCE)e-ISSN: 2278-0661, p-ISSN: 2278-8727 volume 13, Issue 2 (Jul. -Aug. 2013), PP 66-73
Hani Alshamrani, “Internet Protocol Security (IPSec) Mechanisms”, International Journal of Scientific & Engineering Research, Volume 5, Issue 5, May-2014, pp. 85-87.
ChanderDiwakar, Sandeep Kumar, Amit Chaudhary, “SECURITY THREATS IN PEER TO PEER NETWORKS”, Journal of Global Research in Computer Science, Volume 2, No. 4, April 2011, pp. 81-84.
HaroonShakiratOluwatosin, “ClientServer Model”, Journal of Computer Engieering (IOSR-JCE), Volume 16, Issue 1, Feb. 2014, pp. 67-71.
Ms. Jasmin Bhambure, Ms. DhanashriChavan, Ms. Pallavi Band, Mrs.LakshmiMadhuri, “Secure Authentication Protocol in Client – Server Application using Visual Cryptography”, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 4, Issue 2, February 2014, pp. 556-560.
Mohan V. Pawar, Anuradha J, Security of network and Types of Attacks in Network”, International Conference on
Intelligent Computing, Communication & Convergence, 2015, pp. 503 – 506.
MANJIRI N. MULEY, “ANALYSIS FOR EXPLORING THE SCOPE OF NETWORK SECURITY TECHNIQUES IN DIFFERENT ERA: A STUDY”, International Journal of Advanced Computational Engineering and Networking, Volume-3, Issue-12, Dec.-2015, pp. 33-36.
Rupam, AtulVerma, Ankita Singh, “An Approach to Detect Packets Using Packet Sniffing, International Journal of Computer Science & Engineering Survey (IJCSES) ,Vol.4, No.3, June 2013, pp.21-33.
Downloads
Published
How to Cite
Issue
Section
License
This work is licensed under a Creative Commons Attribution 4.0 International License.
Re-users must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use. This license allows for redistribution, commercial and non-commercial, as long as the original work is properly credited.