In this section, the literature survey on the steganography and various network security mechanisms are identified. Many existing algorithms for steganography since 1991 to 2009 are studied and shown in this literature survey. Amounts of web sites as well as research papers are known on virtualization, ARP Spoofing, IDS Architectures. The explanation of the research papers referred regarding steganography and network security receive in the subsequent sections. The books is provided in chronological order for both of these areas independently.
2. 2 Books survey on steganography
Bender et al. [6] in this paper, the authors identify the techniques of data covering like low little bit rate data hiding in detail.
Johnson, N. and Jajodia S.
Main