Abstract:
As the demand of more secure yet efficient image steganography tools has increased, different steganography approaches have been proposed. In this paper some of those app...Show MoreMetadata
Abstract:
As the demand of more secure yet efficient image steganography tools has increased, different steganography approaches have been proposed. In this paper some of those approaches are examined in order to identify the appropriate image steganography technique to be implemented in an electronic voting system. Different set of criteria has been set into place to analyze and evaluate the strengths and weaknesses of the presented steganography approaches.
Published in: Proceedings of 2011 International Conference on Computer Science and Network Technology
Date of Conference: 24-26 December 2011
Date Added to IEEE Xplore: 12 April 2012
ISBN Information:
Related Articles are not available for this document.