Research Article
STEGANALYSIS TECHNIQUES AND COMPARISON OF AVAILABLE SOFTWARES
@INPROCEEDINGS{10.4108/eai.28-6-2020.2297970, author={Muhammad Hassan and Murad AMIN and Suzan Mahdi}, title={STEGANALYSIS TECHNIQUES AND COMPARISON OF AVAILABLE SOFTWARES}, proceedings={Proceedings of the 1st International Multi-Disciplinary Conference Theme: Sustainable Development and Smart Planning, IMDC-SDSP 2020, Cyperspace, 28-30 June 2020}, publisher={EAI}, proceedings_a={IMDC-SDSP}, year={2020}, month={9}, keywords={image security steganography data security}, doi={10.4108/eai.28-6-2020.2297970} }
- Muhammad Hassan
Murad AMIN
Suzan Mahdi
Year: 2020
STEGANALYSIS TECHNIQUES AND COMPARISON OF AVAILABLE SOFTWARES
IMDC-SDSP
EAI
DOI: 10.4108/eai.28-6-2020.2297970
Abstract
The technological advancements of the present time bring along the necessity to maintain the security of the data which are available on the digital platform. Encryption and steganography techniques include the solution techniques used to ensure this security. The robustness of these techniques are also tested by analysis techniques. In this study, the steganalysis methods which are being used are explained. The results obtained are indicated in the charts.
Copyright © 2020–2024 EAI