In this section, the literature survey on the steganography and various network security mechanisms are identified. Many existing algorithms for steganography since 1991 to 2009 are studied and shown in this literature survey. Amounts of web sites as well as research papers are known on virtualization, ARP Spoofing, IDS Architectures. The explanation of the research papers referred regarding steganography and network security receive in the subsequent sections. The..
Background of steganography
Steganography has been derived from Greek word "Stego" which means "Covered" and "Graphia" which means "writing". Steganography is an ancient approach of covert communication. The earliest form of Steganography has been reported by the China. The secret meaning was written in very fine silk or newspaper, and then it was rolled into a ball and covered with wax. The messenger would either swallow the ball or conceal it in his nether parts. Herodotus has brought up in one of his..