dc.contributor.author |
Manoharan, Sathiamoorthy |
en |
dc.contributor.editor |
Society, Published by IEEE Computer |
en |
dc.coverage.spatial |
Bucharest |
en |
dc.date.accessioned |
2012-04-01T22:11:45Z |
en |
dc.date.issued |
2008 |
en |
dc.identifier.citation |
International Conference on Internet Monitoring and Protection, Bucharest, 29 Jun 2008 - 05 Jul 2008. Editors: Society PBIEEEC. Institute of Electrical and Electronics Engineers (IEEE). 172-177. 2008 |
en |
dc.identifier.isbn |
978-0-7695-3189-2 |
en |
dc.identifier.uri |
http://hdl.handle.net/2292/16286 |
en |
dc.description.abstract |
Steganography is the science of hiding messages within some cover media.The intent is usually covert communication, but steganography is equally used for digital watermarking of media. Messages can be hidden in any media. Typical media include digital images, sound, and video. Steganalysis is the science of detecting the presence of hidden messages in media. Most steganalysis techniques search for artifacts created by the message hiding process. A simple and commonly-used steganograpy technique is LSB steganography where the least-significant bits (LSB) of data values in a media file are altered to hide a message. There are also a number of published steganalysis techniques for LSB steganography. This paper presents an empirical analysis of an LSB steganalysis technique called the RS steganlysis. |
en |
dc.publisher |
Institute of Electrical and Electronics Engineers (IEEE) |
en |
dc.relation.ispartof |
International Conference on Internet Monitoring and Protection |
en |
dc.rights |
Items in ResearchSpace are protected by copyright, with all rights reserved, unless otherwise indicated. Previously published items are made available in accordance with the copyright policy of the publisher. |
en |
dc.rights.uri |
https://researchspace.auckland.ac.nz/docs/uoa-docs/rights.htm |
en |
dc.title |
An Empirical Analysis of RS Steganalysis |
en |
dc.type |
Conference Item |
en |
dc.identifier.doi |
10.1109/ICIMP.2008.15 |
en |
pubs.begin-page |
172 |
en |
dc.rights.holder |
Copyright: Institute of Electrical and Electronics Engineers (IEEE) |
en |
pubs.author-url |
http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=4561344 |
en |
pubs.end-page |
177 |
en |
pubs.finish-date |
2008-07-05 |
en |
pubs.start-date |
2008-06-29 |
en |
dc.rights.accessrights |
http://purl.org/eprint/accessRights/RestrictedAccess |
en |
pubs.subtype |
Conference Paper |
en |
pubs.elements-id |
83507 |
en |
pubs.org-id |
Science |
en |
pubs.org-id |
School of Computer Science |
en |
pubs.record-created-at-source-date |
2010-09-01 |
en |