A survey on image steganography algorithms and evaluation
The technique of hiding confidential information within any media is known as Stegonography. Since both stegonography and cryptography are used to protect confidential information, the two are used interchangeably. This is wrong because the appearance of the output from the two processes is totally...
Saved in:
Main Authors: | Lashkari, Arash Habibi, Abdul Manaf, Azizah, Masrom, Maslin, Mohd. Daud, Salwani |
---|---|
Format: | Conference or Workshop Item |
Published: |
2011
|
Subjects: | |
Online Access: | http://eprints.utm.my/id/eprint/29735/ http://dx.doi.org/10.1007/978-3-642-22389-1_36 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
A survey on image steganography algorithms and evaluation
by: Lashkari, Habibi, et al.
Published: (2011) -
A survey on image steganography algorithms and evaluation
by: Lashkari, Arash Habibi, et al.
Published: (2011) -
Security evaluation for graphical password
by: Arash, Habibi Lashkari, et al.
Published: (2011) -
Security evaluation for graphical password
by: Abdul Manaf, Azizah, et al.
Published: (2011) -
The knowledge based authentication attacks
by: Farnaz, Towhidi, et al.
Published: (2011)