![]() An attack approach is dependent on what information is available to the steganalyst (the person who is attempting to detect steganography-based information streams). This is usually done with statistical analysis using advanced statistics techniques.Īttacks and analysis on hidden information may take several forms: detecting, extracting, and disabling or destroying hidden information. The steganalyst starts by reducing the set of suspect information streams to a subset of most likely altered information streams. Unlike cryptanalysis, where it is evident that intercepted encrypted data contains a message, steganalysis generally starts with several suspect information streams but uncertainty whether any of these contain hidden message.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |