- Abstract viewed - 735 times
- Pdf downloaded - 336 times
Affiliations
Alaa Jabbar Qasim almaliki
Universiti Utara Malaysia
Roshidi Din
School of Computing, Universiti Utara Malaysia (UUM), 06010 Sintok, Kedah, MALAYSIA
Sunariya Utama
School of Computing, Universiti Utara Malaysia (UUM), 06010 Sintok, Kedah, MALAYSIA
Salam Ghanim Najeeb
Department of Medical Laboratories, College of Health and Medical Techniques, Sawa University, Almuthana, Iraq
Jabbar Qasim Almaliki
Ashur University, Department of Medical Instrumentation Technique Engineering College, Baghdad, Iraq
How to Cite
Exploring Effective Attack Strategies on Steganographic Systems
- Alaa Jabbar Qasim almaliki ,
- Roshidi Din ,
- Sunariya Utama ,
- Salam Ghanim Najeeb ,
- Jabbar Qasim Almaliki
Vol 6 No 4 (2023): December
Submitted: Dec 18, 2023
Published: Dec 27, 2023
Abstract
First it is shown that the majority of steganographic applications for confidential communication have fundamental weaknesses. On the way to secure steganographic applications, the development of attacks to assess security is essential. The attacks on known algorithms presented here visualize the fallacy that the least significant bits are irrelevant. In addition, more objective methods for the detection of steganography using statistical means.