Security

Analysis of Different Steganographic Algorithms for Secured Data Hiding

Download Now Free registration required

Executive Summary

The goal of steganography is to avoid drawing suspicion to the transmission of a hidden message. If suspicion is raised, steganography may fail. The success of steganography depends on the secrecy of the action. If steganography is detected, the system will fail but data security depends on the robustness of the applied algorithm. In this paper, the authors compress the secret message and encrypt it by the receiver's public key along with the stego key and embed both messages in a carrier using an embedding algorithm.

  • Format: PDF
  • Size: 333.98 KB