International Journal of Computer Applications |
Foundation of Computer Science (FCS), NY, USA |
Volume 82 - Number 2 |
Year of Publication: 2013 |
Authors: K. J Eldho |
10.5120/14088-1603 |
K. J Eldho . Analysing the Efficiency of the Packet Hiding Methods based on the Strong Hiding Commitment Scheme (SHCS). International Journal of Computer Applications. 82, 2 ( November 2013), 20-27. DOI=10.5120/14088-1603
This research describes about analyze the packet hiding methods. These methods are efficiently hiding the data packets while transferring in the network Medias. To protect the system from the unauthorized users, unauthorized programs, threaten the confidential matters and confirm the system availability to the legal users. Our need of network security has broken into two needs. One is the need of information security and other is the need of computer security. On internet or any network of an organization, thousands of important information is exchanged daily. This information can be misused by attackers. The information security is needed for the following given reasons. In my project, a single text file is the input of the system. In this project analysis of packet hiding methods, there are three types of transferring data are performed. In this I have analysis of the result manually. I have taken different sizes of file. This file is included in packet hiding methods. I calculate encryption times of the different files and different methods. Here different outputs are obtained.