"Stego-Analysis Chain, Session One" investigations on steganography weakness Vs stego-analysis system for multimedia file
This paper give an overview on hidden data in a different carrier, in particular the paper overview different technique for steganography and giving a brief explain about each one, in order to implements stego-analysis system, this paper highlight the weak on the hidden data technique(disadvantage,...
Main Authors: | Naji, Ahmed Wathik, Gunawan, Teddy Surya, Hameed, Shihab A., Zaidan, B.B., Zaidan, A.A. |
---|---|
Format: | Conference or Workshop Item |
Language: | English |
Published: |
2009
|
Subjects: | |
Online Access: | http://irep.iium.edu.my/2335/ http://irep.iium.edu.my/2335/ http://irep.iium.edu.my/2335/1/Stego-Analysis_Chain%2C_Session_One%2C_Investigations_on_Steganography_Weakness_Vs_Stego-Analysis_System_for_Multimedia_File.pdf |
Similar Items
-
“Stego-analysis chain, session two” novel approach of stego-analysis system for image file
by: Naji, Ahmed Wathik, et al.
Published: (2009) -
Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography
by: Naji, Ahmed Wathik, et al.
Published: (2009) -
Challenges of hidden data in the unused area two within executable files
by: Naji, Ahmed Wathik, et al.
Published: (2009) -
New system for secure cover file of hidden data in the image page within executable file using statistical Steganography Techniques
by: Islam, Md. Rafiqul, et al.
Published: (2009) -
Securing cover-file without limitation of hidden data size using computation between cryptography and steganography
by: Zaidan , A. A., et al.
Published: (2009)