An introduction to image steganography techniques
Steganography is a form of security technique through obscurity, the science and art of hiding the existence of a message between sender and intended recipient. Steganography has been used to hide secret messages in various types of files, including digital images, audio and video. The three most im...
保存先:
主要な著者: | , , |
---|---|
フォーマット: | Conference or Workshop Item |
出版事項: |
2013
|
主題: | |
オンライン・アクセス: | http://eprints.utm.my/id/eprint/50892/ http://dx.doi.org/10.1109/ACSAT.2012.25 |
タグ: |
タグ追加
タグなし, このレコードへの初めてのタグを付けませんか!
|
id |
my.utm.50892 |
---|---|
record_format |
eprints |
spelling |
my.utm.508922017-09-14T07:51:26Z http://eprints.utm.my/id/eprint/50892/ An introduction to image steganography techniques Altaay, A. A. J. Sahib, S. B. Zamani, M. QA75 Electronic computers. Computer science Steganography is a form of security technique through obscurity, the science and art of hiding the existence of a message between sender and intended recipient. Steganography has been used to hide secret messages in various types of files, including digital images, audio and video. The three most important parameters for audio steganography are imperceptibility, payload, and robustness. Different applications have different requirements of the steganography technique used. This paper intends to give an overview of image steganography, its uses and techniques. 2013 Conference or Workshop Item PeerReviewed Altaay, A. A. J. and Sahib, S. B. and Zamani, M. (2013) An introduction to image steganography techniques. In: Proceedings - 2012 International Conference on Advanced Computer Science Applications and Technologies, ACSAT 2012. http://dx.doi.org/10.1109/ACSAT.2012.25 |
institution |
Universiti Teknologi Malaysia |
building |
UTM Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Teknologi Malaysia |
content_source |
UTM Institutional Repository |
url_provider |
http://eprints.utm.my/ |
topic |
QA75 Electronic computers. Computer science |
spellingShingle |
QA75 Electronic computers. Computer science Altaay, A. A. J. Sahib, S. B. Zamani, M. An introduction to image steganography techniques |
description |
Steganography is a form of security technique through obscurity, the science and art of hiding the existence of a message between sender and intended recipient. Steganography has been used to hide secret messages in various types of files, including digital images, audio and video. The three most important parameters for audio steganography are imperceptibility, payload, and robustness. Different applications have different requirements of the steganography technique used. This paper intends to give an overview of image steganography, its uses and techniques. |
format |
Conference or Workshop Item |
author |
Altaay, A. A. J. Sahib, S. B. Zamani, M. |
author_facet |
Altaay, A. A. J. Sahib, S. B. Zamani, M. |
author_sort |
Altaay, A. A. J. |
title |
An introduction to image steganography techniques |
title_short |
An introduction to image steganography techniques |
title_full |
An introduction to image steganography techniques |
title_fullStr |
An introduction to image steganography techniques |
title_full_unstemmed |
An introduction to image steganography techniques |
title_sort |
introduction to image steganography techniques |
publishDate |
2013 |
url |
http://eprints.utm.my/id/eprint/50892/ http://dx.doi.org/10.1109/ACSAT.2012.25 |
_version_ |
1643652877162381312 |
score |
13.154949 |