DocumentCode :
2613446
Title :
"Stego-Analysis Chain, Session One" Investigations on Steganography Weakness vs Stego-Analysis System for Multimedia File
Author :
Naji, A.W. ; Gunawan, Teddy S. ; Hameed, Shihab A. ; Zaidan, B.B. ; Zaidan, A.A.
Author_Institution :
Dept. of Electr. & Comput. Eng., Int. Islamic Univ. Malaysia, Kuala Lumpur, Malaysia
fYear :
2009
fDate :
17-20 April 2009
Firstpage :
405
Lastpage :
409
Abstract :
This paper give an overview on hidden data in a different carrier, in particular the paper overview different technique for steganography and giving a brief explain about each one, in order to implements stego-analysis system. This paper highlight the weakness of the hidden data technique (disadvantage, weak point, type of attacker, stage of attacking the massage, ..etc). This paper also appoint the name of attackers on the hidden data and the passable way they follow against that data. The review have gone through the characterization of steganography systems, it also discuss many features on this area, which it may somehow give proper idea about implementing some stego-analysis systems.
Keywords :
steganography; hidden data; multimedia file; steganography; stego-analysis system; Conselmet Methodes; Hidden Data; Steganography; Steganography Attackers; Stego-Analysis;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computer Science and Information Technology - Spring Conference, 2009. IACSITSC '09. International Association of
Conference_Location :
Singapore
Print_ISBN :
978-0-7695-3653-8
Type :
conf
DOI :
10.1109/IACSIT-SC.2009.105
Filename :
5169382
Link To Document :
بازگشت