Abstract
As the demand of more secure yet efficient image steganography tools has increased, different steganography approaches have been proposed. In this paper some of those approaches are examined in order to identify the appropriate image steganography technique to be implemented in an electronic voting system. Different set of criteria has been set into place to analyze and evaluate the strengths and weaknesses of the presented steganography approaches.
Original language | English |
---|---|
Title of host publication | Proceedings of 2011 International Conference on Computer Science and Network Technology, ICCSNT 2011 |
Publisher | IEEE |
Pages | 120-124 |
Number of pages | 5 |
Volume | 1 |
ISBN (Print) | 9781457715846 |
DOIs | |
Publication status | Published - 12 Apr 2012 |
Externally published | Yes |
Event | 2011 International Conference on Computer Science and Network Technology, ICCSNT 2011 - Harbin, China Duration: 24 Dec 2011 → 26 Dec 2011 |
Conference
Conference | 2011 International Conference on Computer Science and Network Technology, ICCSNT 2011 |
---|---|
Country/Territory | China |
City | Harbin |
Period | 24/12/11 → 26/12/11 |
Keywords
- electronic voting
- F5
- image steganography
- Least Significant Bit
- palette-based
- spread spectrum