"Stego-Analysis Chain, Session One" investigations on steganography weakness Vs stego-analysis system for multimedia file

This paper give an overview on hidden data in a different carrier, in particular the paper overview different technique for steganography and giving a brief explain about each one, in order to implements stego-analysis system, this paper highlight the weak on the hidden data technique(disadvantage,...

Full description

Bibliographic Details
Main Authors: Naji, Ahmed Wathik, Gunawan, Teddy Surya, Hameed, Shihab A., Zaidan, B.B., Zaidan, A.A.
Format: Conference or Workshop Item
Language:English
Published: 2009
Subjects:
Online Access:http://irep.iium.edu.my/2335/
http://irep.iium.edu.my/2335/
http://irep.iium.edu.my/2335/1/Stego-Analysis_Chain%2C_Session_One%2C_Investigations_on_Steganography_Weakness_Vs_Stego-Analysis_System_for_Multimedia_File.pdf
id iium-2335
recordtype eprints
spelling iium-23352012-02-14T10:54:52Z http://irep.iium.edu.my/2335/ "Stego-Analysis Chain, Session One" investigations on steganography weakness Vs stego-analysis system for multimedia file Naji, Ahmed Wathik Gunawan, Teddy Surya Hameed, Shihab A. Zaidan, B.B. Zaidan, A.A. TK Electrical engineering. Electronics Nuclear engineering This paper give an overview on hidden data in a different carrier, in particular the paper overview different technique for steganography and giving a brief explain about each one, in order to implements stego-analysis system, this paper highlight the weak on the hidden data technique(disadvantage, weak point, type of attacker, stage of attacking the massage, etc) this paper also appoint the name of attackers on the data hidden and the passable way they follow for against that data, the review have gone through the characterization of Steganography Systems, it also disscuses many features on this area, which it may somehow give proper idea about immplement some stego-analysis systems. 2009-04 Conference or Workshop Item PeerReviewed application/pdf en http://irep.iium.edu.my/2335/1/Stego-Analysis_Chain%2C_Session_One%2C_Investigations_on_Steganography_Weakness_Vs_Stego-Analysis_System_for_Multimedia_File.pdf Naji, Ahmed Wathik and Gunawan, Teddy Surya and Hameed, Shihab A. and Zaidan, B.B. and Zaidan, A.A. (2009) "Stego-Analysis Chain, Session One" investigations on steganography weakness Vs stego-analysis system for multimedia file. In: 2009 International Association of Computer Science and Information Technology - Spring Conference, 17-20 April 2009, Singapore. http://www.computer.org/portal/web/csdl/doi/10.1109/IACSIT-SC.2009.105
repository_type Digital Repository
institution_category Local University
institution International Islamic University Malaysia
building IIUM Repository
collection Online Access
language English
topic TK Electrical engineering. Electronics Nuclear engineering
spellingShingle TK Electrical engineering. Electronics Nuclear engineering
Naji, Ahmed Wathik
Gunawan, Teddy Surya
Hameed, Shihab A.
Zaidan, B.B.
Zaidan, A.A.
"Stego-Analysis Chain, Session One" investigations on steganography weakness Vs stego-analysis system for multimedia file
description This paper give an overview on hidden data in a different carrier, in particular the paper overview different technique for steganography and giving a brief explain about each one, in order to implements stego-analysis system, this paper highlight the weak on the hidden data technique(disadvantage, weak point, type of attacker, stage of attacking the massage, etc) this paper also appoint the name of attackers on the data hidden and the passable way they follow for against that data, the review have gone through the characterization of Steganography Systems, it also disscuses many features on this area, which it may somehow give proper idea about immplement some stego-analysis systems.
format Conference or Workshop Item
author Naji, Ahmed Wathik
Gunawan, Teddy Surya
Hameed, Shihab A.
Zaidan, B.B.
Zaidan, A.A.
author_facet Naji, Ahmed Wathik
Gunawan, Teddy Surya
Hameed, Shihab A.
Zaidan, B.B.
Zaidan, A.A.
author_sort Naji, Ahmed Wathik
title "Stego-Analysis Chain, Session One" investigations on steganography weakness Vs stego-analysis system for multimedia file
title_short "Stego-Analysis Chain, Session One" investigations on steganography weakness Vs stego-analysis system for multimedia file
title_full "Stego-Analysis Chain, Session One" investigations on steganography weakness Vs stego-analysis system for multimedia file
title_fullStr "Stego-Analysis Chain, Session One" investigations on steganography weakness Vs stego-analysis system for multimedia file
title_full_unstemmed "Stego-Analysis Chain, Session One" investigations on steganography weakness Vs stego-analysis system for multimedia file
title_sort "stego-analysis chain, session one" investigations on steganography weakness vs stego-analysis system for multimedia file
publishDate 2009
url http://irep.iium.edu.my/2335/
http://irep.iium.edu.my/2335/
http://irep.iium.edu.my/2335/1/Stego-Analysis_Chain%2C_Session_One%2C_Investigations_on_Steganography_Weakness_Vs_Stego-Analysis_System_for_Multimedia_File.pdf
first_indexed 2023-09-18T20:09:55Z
last_indexed 2023-09-18T20:09:55Z
_version_ 1777407408460529664