作者
Mazdak Zamani, Azizah Abdul Manaf, Rabiah Ahmad, Farhang Jaryani, Hamed Taherdoost, Akram Zeki
发表日期
2009/11/9
研讨会论文
Internet Technology and Secured Transactions, 2009. ICITST 2009. International Conference for
页码范围
1-6
出版商
IEEE
简介
A wide range of steganography techniques has been described in this paper. Beside the evaluation of embedding parameters for the existing techniques, two problems -weaknesses- of substitution techniques are investigated which if they could be solved, the large capacity - strength- of substitution techniques would be practical. Furthermore, a novel, principled approach to resolve the problems is presented. Using the proposed genetic algorithm, message bits are embedded into multiple, vague and higher LSB layers, resulting in increased robustness.
引用总数
2008200920102011201220132014201520162017201820192020202120222023202411411179105834311321
学术搜索中的文章
M Zamani, ABA Manaf, RB Ahmad, F Jaryani… - 2009 International Conference for Internet Technology …, 2009