RAKS. M. PK 1.0, an Efficient Methodology to Determine the Steganography Signature of Steganography Tools

As all know, Steganography is being used in terrorist activities these days. Terrorist used to hide information behind carrier image in form of text or image which may be transferred sent or received through Social Networking Sites such as Facebook, Tweeter, LinkedIn, etc. but unfortunately, no social networking sites have control over such stego Image transfer. In this paper, the authors have discussed why RAKS. M. PK 1.0 is better and efficient over other techniques of to detect whether an image is stego or normal by explaining the working mechanism of RAKS. M. PK 1.0.
Provided by: Computer Science & Electronics Journals Topic: Security Date Added: Sep 2015 Format: PDF

Find By Topic