Information Hiding Using Steganography

  title={Information Hiding Using Steganography},
  author={Mohamed N. Amin and S. Ibrahim and Mazleena Salleh and MOHD ROZI},
The Internet as a whole does not use secure links, thus information in transit may be vulnerable to interception as well. The important of reducing a chance of the information being detected during the transmission is being an issue now days. Some solution to be discussed is how to passing information in a manner that the very existence of the message is unknown in order to repel attention of the potential attacker. Besides hiding data for confidentiality, this approach of information hiding… CONTINUE READING
Highly Cited
This paper has 81 citations. REVIEW CITATIONS


Publications citing this paper.
Showing 1-10 of 54 extracted citations

81 Citations

Citations per Year
Semantic Scholar estimates that this publication has 81 citations based on the available data.

See our FAQ for additional information.


Publications referenced by this paper.
Showing 1-10 of 19 references

Steganography: Hidden Menace or Hidden Saviour

  • R A Isbell
  • Steganography White Paper,
  • 2002
Highly Influential
4 Excerpts

Detecting Steganography Content on the Internet

  • N. Provos, P. Honeyman
  • CITI Technical Report 01-11,
  • 2001
Highly Influential
4 Excerpts

Information Hiding Using Steganography

  • M. M. Amin, M. Salleh, S. Ibrahim
  • National Conference On Telecommunication…
  • 2003
2 Excerpts

Peticolas, “Defining Security in Steganographic Systems

  • F.A.P.S. Katzenbeisser
  • Proceeding of Electronic Imaging, Photonics West…
  • 2002

Similar Papers

Loading similar papers…