Abstract
The comparison between steganography and steganalysis which represents an important part of 21st century cyber warfare with a profound influence on information security is discussed. Quantization Index Modulation (QIM) approach uses different quantizers to carry different bits of the secret data. Some embedding tools cause subtle changes in the set of possible values that may be taken by the pixel gray levels and transform coefficients. Latest embedding methods are devised that avoid creation of new colors to combat steganalytic tools based on analyzing the increase of unique colors in an image.
| Original language | English |
|---|---|
| Pages (from-to) | 76-82 |
| Journal | Communications of the ACM |
| Volume | 47 |
| Issue number | 10 |
| DOIs | |
| Publication status | Published - Oct 2004 |
| Externally published | Yes |
Bibliographical note
Publication details (e.g. title, author(s), publication statuses and dates) are captured on an “AS IS” and “AS AVAILABLE” basis at the time of record harvesting from the data source. Suggestions for further amendments or supplementary information can be sent to <a href="mailto:[email protected]">[email protected]</a>.Fingerprint
Dive into the research topics of 'Cyber warfare: Steganography vs. steganalysis'. Together they form a unique fingerprint.Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver