Which of the following Steganography attacks is Victor using?

Victor works as a professional Ethical Hacker for SecureEnet Inc. He has been assigned a job to
test an image, in which some secret information is hidden, using Steganography. Victor performs
the following techniques to accomplish the task:
1. Smoothening and decreasing contrast by averaging the pixels of the area where significant
color transitions occurs.
2. Reducing noise by adjusting color and averaging pixel value.
3. Sharpening, Rotating, Resampling, and Softening the image.
Which of the following Steganography attacks is Victor using?

Victor works as a professional Ethical Hacker for SecureEnet Inc. He has been assigned a job to
test an image, in which some secret information is hidden, using Steganography. Victor performs
the following techniques to accomplish the task:
1. Smoothening and decreasing contrast by averaging the pixels of the area where significant
color transitions occurs.
2. Reducing noise by adjusting color and averaging pixel value.
3. Sharpening, Rotating, Resampling, and Softening the image.
Which of the following Steganography attacks is Victor using?

A.
Steg-Only Attack

B.
Chosen-Stego Attack

C.
Active Attacks

D.
Stegdetect Attack

Explanation:



Leave a Reply 0

Your email address will not be published. Required fields are marked *