z-logo
open-access-imgOpen Access
A Review of Intrusion Detection Systems
Author(s) -
Omar Ahmed,
Wafaa Abdullah
Publication year - 2017
Publication title -
academic journal of nawroz university
Language(s) - English
Resource type - Journals
ISSN - 2520-789X
DOI - 10.25007/ajnu.v6n3a91
Subject(s) - steganography , cloud computing , computer science , computer security , eavesdropping , communication source , intrusion detection system , cloud computing security , server , computer network , embedding , operating system , artificial intelligence
As with the growth of information on the cloud, cloud security is seen as more essential than before. Presently, millions of users are utilizing the cloud. The security of cloud computing is urgently required, where data are being transmitted or transferred between the users and servers. Steganography is considered as the most effective techniques for securing the communication in the cloud. Steganography refers to writing hidden messages in a way that only the sender and receiver have the ability to safely know and transfer the hidden information in the means of communications. This paper review some of the recent steganography techniques that have been proposed to improve the security of data in the cloud and to make it more immune to cyber-attacks and eavesdropping.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here
Accelerating Research

Address

John Eccles House
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom