{"title":"隐写软件工具的比较","authors":"H. Arif, H. Hajjdiab","doi":"10.1109/ICIS.2017.7960030","DOIUrl":null,"url":null,"abstract":"The process of hiding data in a medium that is insignificant, ordinary and not a secret is referred to as Steganography. This medium may be an image, text, video, audio, pdf, etc. The main advantage of Steganography is the fact that data is hidden in such a way that attackers find it hard to figure out exactly what the medium that carries the hidden message is. This is because the data is hidden in a medium that is not suspicious. Steganography tools take input images that can embed data like text or images inside of them. These tools then hide the text or image in the input image to create an output image. This image although looks similar to the input image, contains secret text or image information. In this paper, we will compare various tools that offer different algorithms for Steganography. We will input the same images and hide an image in them and see the different output images that are produced by the tools and compare them.","PeriodicalId":301467,"journal":{"name":"2017 IEEE/ACIS 16th International Conference on Computer and Information Science (ICIS)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"A comparision between steganography software tools\",\"authors\":\"H. Arif, H. Hajjdiab\",\"doi\":\"10.1109/ICIS.2017.7960030\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The process of hiding data in a medium that is insignificant, ordinary and not a secret is referred to as Steganography. This medium may be an image, text, video, audio, pdf, etc. The main advantage of Steganography is the fact that data is hidden in such a way that attackers find it hard to figure out exactly what the medium that carries the hidden message is. This is because the data is hidden in a medium that is not suspicious. Steganography tools take input images that can embed data like text or images inside of them. These tools then hide the text or image in the input image to create an output image. This image although looks similar to the input image, contains secret text or image information. In this paper, we will compare various tools that offer different algorithms for Steganography. We will input the same images and hide an image in them and see the different output images that are produced by the tools and compare them.\",\"PeriodicalId\":301467,\"journal\":{\"name\":\"2017 IEEE/ACIS 16th International Conference on Computer and Information Science (ICIS)\",\"volume\":\"15 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-05-24\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 IEEE/ACIS 16th International Conference on Computer and Information Science (ICIS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICIS.2017.7960030\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 IEEE/ACIS 16th International Conference on Computer and Information Science (ICIS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICIS.2017.7960030","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A comparision between steganography software tools
The process of hiding data in a medium that is insignificant, ordinary and not a secret is referred to as Steganography. This medium may be an image, text, video, audio, pdf, etc. The main advantage of Steganography is the fact that data is hidden in such a way that attackers find it hard to figure out exactly what the medium that carries the hidden message is. This is because the data is hidden in a medium that is not suspicious. Steganography tools take input images that can embed data like text or images inside of them. These tools then hide the text or image in the input image to create an output image. This image although looks similar to the input image, contains secret text or image information. In this paper, we will compare various tools that offer different algorithms for Steganography. We will input the same images and hide an image in them and see the different output images that are produced by the tools and compare them.