Image steganalysis
Document Type
Article
Publication Date
4-14-2010
Abstract
No matter how unbreakable an encryption algorithm is, the encrypted messages will attract an adversary's awareness. Steganography can resolve this difficulty by embedding secret data into an innocuous cover medium, such as image, video, text, audio, etc. The transmission of the innocuous medium will not arouse much suspicion. Therefore, whereas cryptography only protects the contents of the secret message, steganography conceals the very existence of secret information, making the secret communications imperceptible [6]. © 2010 Springer-Verlag Berlin Heidelberg.
Identifier
77950567665 (Scopus)
ISBN
[9783642117541]
Publication Title
Studies in Computational Intelligence
External Full Text Location
https://doi.org/10.1007/978-3-642-11756-5_13
ISSN
1860949X
First Page
275
Last Page
303
Volume
282
Recommended Citation
Huang, Fangjun; Li, Bin; Shi, Yun Qing; Huang, Jiwu; and Xuan, Guorong, "Image steganalysis" (2010). Faculty Publications. 6345.
https://digitalcommons.njit.edu/fac_pubs/6345
