Disappearing cryptography: being and nothingness on the net
Disappearing cryptography: being and nothingness on the net
IBM Systems Journal
Hiding Data in the OSI Network Model
Proceedings of the First International Workshop on Information Hiding
Steganalysis using image quality metrics
IEEE Transactions on Image Processing
Hi-index | 0.00 |
In this study, the aim and application areas of steganography and steganalysis are briefly described. Kinds of techniques used in steganography are analyzed and compared to each other according to their simplicity and robustness. Then, methods used in steganalysis in order to detect various kinds of steganography such as text, image, audio, video and file system steganography are examined. Finally, a steganography application for the receptions of the Presidency of the Republic of Turkey is developed. The identity information of the guests are first encrypted, and then embedded in their photos using the LSB technique on BMP images. Original and stego images after the embedding process are compared to each other and the robustness of the application against steganalysis attacks is measured using VSL tool.