Lashkari, Habibi and Abdul Manaf, Azizah and Masrom, Maslin and Mohd. Daud, Salwani (2011) A survey on image steganography algorithms and evaluation. In: Communications in Computer and Information Science. Springer Berlin Heidelberg, pp. 406-418. ISBN 978-364222388-4
Full text not available from this repository.
Official URL: http://dx.doi.org/10.1007/978-3-642-22389-1_36
The technique of hiding confidential information within any media is known as Stegonography. Since both stegonography and cryptography are used to protect confidential information, the two are used interchangeably. This is wrong because the appearance of the output from the two processes is totally different; the output from a stegonography operation is not apparently visible while for cryptography the output is scrambled such that it easily draws attention. The detection of the presence of stegonography is referred to as Steganlysis. In this article we have attempted to elucidate the main image steganography approaches, and then we will evaluate the techniques and result will show in a table and discuss.
|Item Type:||Book Section|
|Uncontrolled Keywords:||discrete cosine transform (DCT), image steganography, least significant bit (LSB), palette-based techniques, patchwork technique (PW), perturbed quantization (PQ), pseudorandom permutations (PP), spread spectrum (SS), steganography|
|Deposited By:||Liza Porijo|
|Deposited On:||07 Nov 2012 00:44|
|Last Modified:||04 Feb 2017 07:49|
Repository Staff Only: item control page