Author: Mathkour, H. Al-Sadoon, B. Touir, A.
Comput. Sci. Dept., King Saud Univ., Riyadh
This paper appears in: Wireless Communications, Networking and Mobile Computing, 2008. WiCOM '08. 4th International Conference on
Publication Date: 12-14 Oct. 2008
On page(s): 1 - 4
Location: Dalian
ISBN: 978-1-4244-2107-7
Digital Object Identifier: 10.1109/WiCom.2008.2918
Current Version Published: 2008-11-18
Abstract:
Various image steganography techniques have been proposed. In this paper, we investigate diverse steganography techniques and tools. We state a set of criteria to analyze and evaluate the strengths and weaknesses of the presented techniques. We propose a more robust steganography technique that takes advantages of the strengths and avoids the limitations.
連結文章
2009年10月14日 星期三
訂閱:
張貼留言 (Atom)
沒有留言:
張貼留言