(71)is the science of hiding information。Whereas the goal of cryptography is to make data unreadable by a third party。the goal of steganography is to hide the data from a third party。In this article,I will discuss what steganography is,what purposes it serves,and will provide an example using available software。
  There are a large number of steganographic(2)that most of us are familiar with(especially if you watch a lot of spy movies),ranging from invisible ink and microdots to secreting a hidden message in the second letter of each word of a large body of text and spread spectrum radio communication。With computers and networks,there are many other ways of hiding informations,such as:
  Covert channels(c,g,Loki and some distributed denial-of-service tools use the Internet Control(3)Protocol,or ICMP,as the communication channel between the“bad guy”and a compromicyed system)
  Hidden text within Web pages
  Hiding files in“plain sight”(c,g,what better place to“hide”a file than with an important sounding name in the c:\winnt system32 directory)
  Null ciphers(c,g,using the first letter of each word to form a hidden message in an otherwise innocuous text)
  steganography today,however,is significantly more(4)than the example about suggest,allowing a user to hide large amounts of information within image and audio。These forms of steganography often are used in conjunction with cryptography so the information is double protected;first it is encrypted and then hidden so that an advertisement first。find the information(an often difficult task in and of itself)and the decrypted it。
  The simplest approach to hiding data within an image file is called(5)signature insertion。In this method ,we can take the binary representation of the hidden data and the bit of each byte within the covert image。If we are using 24-bit color the amount and will be minimum and indiscriminate to the human eye。
(75)处的单词应是

A.least
B.most
C.much
D.less

查看答案

相关问题推荐

  • 某公司定期组织公司的新老员工进行聚会,按照马斯洛的需求层次理论,该行为满足的是员工的()
    A.生理需求
    B.安全需求
    C.社会需求
    D.受尊重需求
    查看答案
  • 在windows用户管理中,使用组策略A-G-D-L其中A表示()
    A.用户账号
    B.资源访问权限
    C.域本地组
    D.通用组
    查看答案
  • 关于系统建设项目成本预算,下列说法中不正确的是()。
    A.成本总计、管理储备、参数模型和支出合理化原则用于成本预算
    B.成本基准计划是用来衡量差异和未来项目绩效的
    C.成本预算过程对现在的项目活动及未来的运营活动分配资金
    D.成本基准计划计算的是项目的预计成本
    查看答案
  • 已经进行招标的项目,自招标文件开始发出之日起至投标人提交投标文件止,最短不得少于()天。
    A.20
    B.30
    C.15
    D.60
    查看答案
  • ()不是活动历时估算依据。
    A.项目范围说明书
    B.活动资源需求
    C.组织过程资产
    D.项目进度计划
    查看答案
  • 教育方针的特点主要包括
    查看答案
  • 全面建设社会主义现代化国家,最艰巨最繁重的任务仍然在()
    查看答案
  • 张三为自己投保意外伤害保险,保额10万,张三确定李四为受益人.如果张三因意外伤害死亡后,赔款10万元应支付给()
    A.
    张三的配偶
    B.
    张三的子女
    C.
    李四
    D.
    张三的父母
    查看答案
  • 设备监理阶段可分为()、安装调试阶段、试运行阶段监理
    查看答案
  • 关于基金风险指标的计算
    查看答案