<< Chapter < Page | Chapter >> Page > |
In our research we found a steganographic method known as JSteg, created by Derek Upsham. The basic premisebehind JSteg is that its algorithm hides the data sequentially within the least significant bits of the DCT coefficients (Nielsand Honeyman). The problem with JSteg is that it is not very secure; there is no secret key with which it is encrypted. Therefore, anybody that knows animage contains data with JSteg hiding can easily retrieve the hidden message. Our second hiding method, which we have calledbit-o-steg, improves upon the JSteg algorithm since we employ the use of a key when hiding the data.
Notification Switch
Would you like to follow the 'Elec 301 - steganography - what's in your picture?' conversation and receive update notifications?