会议专题

Analysis of Image Steganography Techniques in Secure Online Voting

As the demand of more secure yet efficient image steganography tools has increased, different steganography approaches have been proposed. In this paper some of those approaches are examined in order to identify the appropriate image steganography technique to be implemented in an electronic voting system. Different set of criteria has been set into place to analyze and evaluate the strengths and weaknesses of the presented steganography approaches.

image steganography electronic voting Least Significant Bit palette-based F5 spread spectrum

Lauretha Rura Biju Issac Manas Kumar Haldar

School of Engineering, Computing and Science Swinburne University of Technology (Sarawak Campus) Kuching, Malaysia

国际会议

2011 International Conference on Computer Science and Network Technology(2011计算机科学与网络技术国际会议 ICCSNT 2011)

哈尔滨

英文

120-124

2011-12-24(万方平台首次上网日期,不代表论文的发表时间)