Title :
"Stego-Analysis Chain, Session One" Investigations on Steganography Weakness vs Stego-Analysis System for Multimedia File
Author :
Naji, A.W. ; Gunawan, Teddy S. ; Hameed, Shihab A. ; Zaidan, B.B. ; Zaidan, A.A.
Author_Institution :
Dept. of Electr. & Comput. Eng., Int. Islamic Univ. Malaysia, Kuala Lumpur, Malaysia
Abstract :
This paper give an overview on hidden data in a different carrier, in particular the paper overview different technique for steganography and giving a brief explain about each one, in order to implements stego-analysis system. This paper highlight the weakness of the hidden data technique (disadvantage, weak point, type of attacker, stage of attacking the massage, ..etc). This paper also appoint the name of attackers on the hidden data and the passable way they follow against that data. The review have gone through the characterization of steganography systems, it also discuss many features on this area, which it may somehow give proper idea about implementing some stego-analysis systems.
Keywords :
steganography; hidden data; multimedia file; steganography; stego-analysis system; Conselmet Methodes; Hidden Data; Steganography; Steganography Attackers; Stego-Analysis;
Conference_Titel :
Computer Science and Information Technology - Spring Conference, 2009. IACSITSC '09. International Association of
Conference_Location :
Singapore
Print_ISBN :
978-0-7695-3653-8
DOI :
10.1109/IACSIT-SC.2009.105