الفهرس | Only 14 pages are availabe for public view |
Abstract The recent advances in information systems have brought about extraordinary possibilities and opportunities. Even though these improvements provide the profound benefit of easily exchanged digital information through far-reaching networks, these technologies have also been exploited for criminal activity and malicious intent. In order to protect the systems integrity and to prevent the exploitation of digital information, techniques such as digital cryptography, steganography, and steganalysis have emerged in recent years. A number of techniques with promising results have been proposed in literature, however, these applications are either computationally intensive or do not provide the necessary security. The development of feasible and secure information hiding system techniques still exists as a problem of prime concern. |