Critical evaluation on steganography metrics
The objective of Steganography is to hide the information inside other data in order to avoid being spotted by the strangers. Steganography is an old-fashioned art that has been reborn in current years. This current paper provides a literature review on the security of Steganography organization and...
Saved in:
Main Authors: | , , |
---|---|
Format: | Conference or Workshop Item |
Published: |
2013
|
Subjects: | |
Online Access: | http://eprints.utm.my/id/eprint/50967/ http://dx.doi.org/10.4028/www.scientific.net/AMR.748.927 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Universiti Teknologi Malaysia |
id |
my.utm.50967 |
---|---|
record_format |
eprints |
spelling |
my.utm.509672017-09-14T11:03:45Z http://eprints.utm.my/id/eprint/50967/ Critical evaluation on steganography metrics Noroozi, E. Daud, S. B. M. Sabouhi, A. QA75 Electronic computers. Computer science The objective of Steganography is to hide the information inside other data in order to avoid being spotted by the strangers. Steganography is an old-fashioned art that has been reborn in current years. This current paper provides a literature review on the security of Steganography organization and emphasizes on its measurements. The proposed algorithm introduces a novel hashing and encoding algorithm to generate a digital signature. Later, it has been embedded into the original data which doesnt require extra bandwidth for communication by signature. 2013 Conference or Workshop Item PeerReviewed Noroozi, E. and Daud, S. B. M. and Sabouhi, A. (2013) Critical evaluation on steganography metrics. In: Advanced Materials Research. http://dx.doi.org/10.4028/www.scientific.net/AMR.748.927 |
institution |
Universiti Teknologi Malaysia |
building |
UTM Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Teknologi Malaysia |
content_source |
UTM Institutional Repository |
url_provider |
http://eprints.utm.my/ |
topic |
QA75 Electronic computers. Computer science |
spellingShingle |
QA75 Electronic computers. Computer science Noroozi, E. Daud, S. B. M. Sabouhi, A. Critical evaluation on steganography metrics |
description |
The objective of Steganography is to hide the information inside other data in order to avoid being spotted by the strangers. Steganography is an old-fashioned art that has been reborn in current years. This current paper provides a literature review on the security of Steganography organization and emphasizes on its measurements. The proposed algorithm introduces a novel hashing and encoding algorithm to generate a digital signature. Later, it has been embedded into the original data which doesnt require extra bandwidth for communication by signature. |
format |
Conference or Workshop Item |
author |
Noroozi, E. Daud, S. B. M. Sabouhi, A. |
author_facet |
Noroozi, E. Daud, S. B. M. Sabouhi, A. |
author_sort |
Noroozi, E. |
title |
Critical evaluation on steganography metrics |
title_short |
Critical evaluation on steganography metrics |
title_full |
Critical evaluation on steganography metrics |
title_fullStr |
Critical evaluation on steganography metrics |
title_full_unstemmed |
Critical evaluation on steganography metrics |
title_sort |
critical evaluation on steganography metrics |
publishDate |
2013 |
url |
http://eprints.utm.my/id/eprint/50967/ http://dx.doi.org/10.4028/www.scientific.net/AMR.748.927 |
_version_ |
1643652899467689984 |