Cyber warfare: steganography vs. steganalysis.
Huaiqing WangShuozhong WangPublished in: Commun. ACM (2004)
Keyphrases
- jpeg images
- information hiding
- data hiding
- least significant bit
- hidden information
- network centric
- cyber security
- secret information
- authentication scheme
- data embedding
- secret message
- digital images
- compression algorithm
- high capacity
- spread spectrum
- simulation models
- error correction
- spatial domain
- cyber crime
- compressed images
- discrete cosine transform
- cover image
- remote sensing images
- dct coefficients
- image authentication
- cyber physical systems
- information warfare
- jpeg compression
- reversible data hiding
- watermarking scheme