Analysis of Image Steganography Techniques in Secure Online Voting
As the demand of more secure yet efficient image steganography tools has increased, different steganography approaches have been proposed. In this paper some of those approaches are examined in order to identify the appropriate image steganography technique to be implemented in an electronic voting system. Different set of criteria has been set into place to analyze and evaluate the strengths and weaknesses of the presented steganography approaches.
image steganography electronic voting Least Significant Bit palette-based F5 spread spectrum
Lauretha Rura Biju Issac Manas Kumar Haldar
School of Engineering, Computing and Science Swinburne University of Technology (Sarawak Campus) Kuching, Malaysia
国际会议
哈尔滨
英文
120-124
2011-12-24(万方平台首次上网日期,不代表论文的发表时间)