Image steganalysis

2Citations
Citations of this article
7Readers
Mendeley users who have this article in their library.
Get full text

Abstract

No matter how unbreakable an encryption algorithm is, the encrypted messages will attract an adversary's awareness. Steganography can resolve this difficulty by embedding secret data into an innocuous cover medium, such as image, video, text, audio, etc. The transmission of the innocuous medium will not arouse much suspicion. Therefore, whereas cryptography only protects the contents of the secret message, steganography conceals the very existence of secret information, making the secret communications imperceptible [6]. © 2010 Springer-Verlag Berlin Heidelberg.

Cite

CITATION STYLE

APA

Huang, F., Li, B., Shi, Y. Q., Huang, J., & Xuan, G. (2010). Image steganalysis. Studies in Computational Intelligence, 282, 275–303. https://doi.org/10.1007/978-3-642-11756-5_13

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free