Skip to Main Content
This paper give an overview on hidden data in a different carrier, in particular the paper overview different technique for steganography and giving a brief explain about each one, in order to implements stego-analysis system. This paper highlight the weakness of the hidden data technique (disadvantage, weak point, type of attacker, stage of attacking the massage, ..etc). This paper also appoint the name of attackers on the hidden data and the passable way they follow against that data. The review have gone through the characterization of steganography systems, it also discuss many features on this area, which it may somehow give proper idea about implementing some stego-analysis systems.
Date of Conference: 17-20 April 2009