Al Hussien Seddik Saad1,*, E. H. Hafez2, Zubair Ahmad3
CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 659-674, 2021, DOI:10.32604/cmc.2021.014758
- 12 January 2021
Abstract Steganography has been used to prevent unauthorized access to private information during transmission. It is the scheme of securing sensitive information by concealing it within carriers such as digital images, videos, audio, or text. Current steganography methods are working by assigning a cover file then embed the payload within it by making some modifications, creating the stego-file. However, the left traces that are caused by these modifications will make steganalysis algorithms easily detect the hidden payload. Aiming to solve this issue, a novel, highly robust steganography method based on hacking anti-shoplifting systems has proposed to… More >