IIUM Repository

"Stego-Analysis Chain, Session One" investigations on steganography weakness Vs stego-analysis system for multimedia file

Naji, Ahmed Wathik and Gunawan, Teddy Surya and Hameed, Shihab A. and Zaidan, B.B. and Zaidan, A.A. (2009) "Stego-Analysis Chain, Session One" investigations on steganography weakness Vs stego-analysis system for multimedia file. In: 2009 International Association of Computer Science and Information Technology - Spring Conference, 17-20 April 2009, Singapore.

[img] PDF
Restricted to Registered users only

Download (258kB) | Request a copy

Abstract

This paper give an overview on hidden data in a different carrier, in particular the paper overview different technique for steganography and giving a brief explain about each one, in order to implements stego-analysis system, this paper highlight the weak on the hidden data technique(disadvantage, weak point, type of attacker, stage of attacking the massage, etc) this paper also appoint the name of attackers on the data hidden and the passable way they follow for against that data, the review have gone through the characterization of Steganography Systems, it also disscuses many features on this area, which it may somehow give proper idea about immplement some stego-analysis systems.

Item Type: Conference or Workshop Item (Full Paper)
Additional Information: 5881/2335 ISBN: 978-076953653-8
Uncontrolled Keywords: Stego-Analysis, Steganography, Hidden Data, Steganography Attackers, Conselmet Methodes
Subjects: T Technology > TK Electrical engineering. Electronics Nuclear engineering
Kulliyyahs/Centres/Divisions/Institutes (Can select more than one option. Press CONTROL button): Kulliyyah of Engineering
Kulliyyah of Engineering > Department of Electrical and Computer Engineering
Depositing User: Prof. Dr. Teddy Surya Gunawan
Date Deposited: 07 Sep 2011 16:24
Last Modified: 14 Feb 2012 18:54
URI: http://irep.iium.edu.my/id/eprint/2335

Actions (login required)

View Item View Item

Downloads

Downloads per month over past year