RAKS. M. PK 1.0, an Efficient Methodology to Determine the Steganography Signature of Steganography Tools

Download Now
Provided by: Computer Science & Electronics Journals
Topic: Security
Format: PDF
As all know, Steganography is being used in terrorist activities these days. Terrorist used to hide information behind carrier image in form of text or image which may be transferred sent or received through Social Networking Sites such as Facebook, Tweeter, LinkedIn, etc. but unfortunately, no social networking sites have control over such stego Image transfer. In this paper, the authors have discussed why RAKS. M. PK 1.0 is better and efficient over other techniques of to detect whether an image is stego or normal by explaining the working mechanism of RAKS. M. PK 1.0.
Download Now

Find By Topic