Exam 312-49v10 All QuestionsBrowse all questions from this exam
Question 365

In which of these attacks will a steganalyst use a random message to generate a stego-object by using some steganography tool, to find the steganography algorithm used to hide the information?

    Correct Answer: A

    In a chosen-message attack, the steganalyst selects a random message to create a stego-object using a steganography tool. The purpose of this attack is to identify patterns in the stego-object that can reveal the particular steganography algorithm used to hide the information. This method allows the attacker to analyze how the chosen message is embedded and thus understand the workings of the algorithm.

Discussion
aqeel1506Option: A

A. Chosen-message attack The textbook defines a Chosen-message attack as one where the attacker selects a message to be hidden and then uses this information to analyze and deduce the steganography algorithm used. This method helps in understanding how the algorithm works by observing how the chosen message is embedded.

ElbOption: A

A< Chosen message attack. The steganalyst generates a stego-object from some Steganography tool or algorithm from a chosen message. The goal in this attack is to determine corresponding patterns in the stego-object that may point to the use of specific Steganography tools or algorithms. (This is the most powerful attack.)