Analysis of Different Steganographic Algorithms for Secured Data Hiding

The goal of steganography is to avoid drawing suspicion to the transmission of a hidden message. If suspicion is raised, steganography may fail. The success of steganography depends on the secrecy of the action. If steganography is detected, the system will fail but data security depends on the robustness of the applied algorithm. In this paper, the authors compress the secret message and encrypt it by the receiver's public key along with the stego key and embed both messages in a carrier using an embedding algorithm.

Provided by: International Journal of Computer Science and Network Security Topic: Security Date Added: Aug 2010 Format: PDF

Find By Topic