"Stego-Analysis Chain, Session One" investigations on steganography weakness Vs stego-analysis system for multimedia file

This paper give an overview on hidden data in a different carrier, in particular the paper overview different technique for steganography and giving a brief explain about each one, in order to implements stego-analysis system, this paper highlight the weak on the hidden data technique(disadvantage,...

Full description

Bibliographic Details
Main Authors: Naji, Ahmed Wathik, Gunawan, Teddy Surya, Hameed, Shihab A., Zaidan, B.B., Zaidan, A.A.
Format: Conference or Workshop Item
Language:English
Published: 2009
Subjects:
Online Access:http://irep.iium.edu.my/2335/
http://irep.iium.edu.my/2335/
http://irep.iium.edu.my/2335/1/Stego-Analysis_Chain%2C_Session_One%2C_Investigations_on_Steganography_Weakness_Vs_Stego-Analysis_System_for_Multimedia_File.pdf
Description
Summary:This paper give an overview on hidden data in a different carrier, in particular the paper overview different technique for steganography and giving a brief explain about each one, in order to implements stego-analysis system, this paper highlight the weak on the hidden data technique(disadvantage, weak point, type of attacker, stage of attacking the massage, etc) this paper also appoint the name of attackers on the data hidden and the passable way they follow for against that data, the review have gone through the characterization of Steganography Systems, it also disscuses many features on this area, which it may somehow give proper idea about immplement some stego-analysis systems.