Steganography and Steganalysis : Different Approaches
نویسندگان
چکیده
منابع مشابه
Steganography and Steganalysis: Different Approaches
Steganography is the technique of hiding confidential information within any media. Steganography is often confused with cryptography because the two are similar in the way that they both are used to protect confidential information. The difference between the two is in the appearance in the processed output; the output of steganography operation is not apparently visible but in cryptography th...
متن کاملJSteg: Steganography and Steganalysis
1.Introduction: Steganography is the art and science of hiding communication; a steganographic system thus embeds hidden content in unremarkable cover media so as not to arouse an eavesdropper’s suspicion. In the past, people used hidden tattoos or invisible ink to convey steganographic content. Today, computer and network technologies provide easy-to-use communication channels for steganograph...
متن کاملSteganography and Steganalysis
Steganography, coming from the Greek words stegos, meaning roof or covered and graphia which means writing, is the art and science of hiding the fact that communication is taking place. Using steganography, you can embed a secret message inside a piece of unsuspicious information and send it without anyone knowing of the existence of the secret message. Steganography and cryptography are closel...
متن کاملImage steganography and steganalysis
Image steganography is used to embed covert messages in the form of files, text, or other images in digital images. The intent is to transmit hidden information. Steganalysis is the process used to detect hidden messages in images. Although steganography is not a new discipline, it has become increasingly important in today’s digital world where information is often and easily exchanged through...
متن کاملSteganalysis of Transcoding Steganography
Transcoding steganography (TranSteg) is a fairly new IP telephony steganographic method that functions by compressing overt (voice) data to make space for the steganogram by means of transcoding. It offers high steganographic bandwidth, retains good voice quality, and is generally harder to detect than other existing VoIP steganographic methods. In TranSteg, after the steganogram reaches the re...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Electronics Signals and Systems
سال: 2012
ISSN: 2231-5969
DOI: 10.47893/ijess.2012.1032