“Stego-analysis chain, session two” novel approach of stego-analysis system for image file
Stenography systems has too many approaches, it has a lot of applications and different ways, too many type of attackers have been tried to attacked the information that already embed in the carrier, however there is not yet a real stego- analysis system offered, the goal of this chain is to have t...
Main Authors: | Naji, Ahmed Wathik, Hameed, Shihab A., Islam, Md. Rafiqul, Zaidan, B .B., Gunawan, Teddy Surya, Zaidan, A.A. |
---|---|
Format: | Conference or Workshop Item |
Language: | English |
Published: |
2009
|
Subjects: | |
Online Access: | http://irep.iium.edu.my/2334/ http://irep.iium.edu.my/2334/1/Stego-Analysis_Chain%2C_Session_Two%2C_Novel_Approach_of_Stego-Analysis_System_for_Image_File.pdf |
Similar Items
-
"Stego-Analysis Chain, Session One" investigations on steganography weakness Vs stego-analysis system for multimedia file
by: Naji, Ahmed Wathik, et al.
Published: (2009) -
Challenges of hidden data in the unused area two within executable files
by: Naji, Ahmed Wathik, et al.
Published: (2009) -
Novel simulation framework of three-dimensional skull bio-metric measurement
by: Hameed, Shihab A., et al.
Published: (2009) -
Novel framework for hidden data in the image page within
executable file using computation between advanced encryption standard and distortion techniques
by: Naji, Ahmed Wathik, et al.
Published: (2009) -
Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography
by: Naji, Ahmed Wathik, et al.
Published: (2009)