Learn More
The unique characteristics of a mobile ad hoc network (MANET), such as dynamic topology, shared wireless medium and open peer-to-peer network architecture, pose various security challenges. This paper compares three routing protocols, DSDV, DSR, and AODV under security attack where two types of node misbehaviour have been investigated. Network performance(More)
After analysis of various existing text-based steganography techniques, an efficient information hiding algorithm for text based on substituted conception is proposed in this paper. The algorithm achieves information hiding by replacing the substituted units in original text with similar conception. It takes advantage of a user-defined knowledge base,(More)
  • 1