Adaptive insertion
An introduction to Steganography
Article REF: H5870 V2
Adaptive insertion
An introduction to Steganography

Author : Fabien GALAND

Publication date: February 10, 2015 | Lire en français

Logo Techniques de l'Ingenieur You do not have access to this resource.
Request your free trial access! Free trial

Already subscribed?

4. Adaptive insertion

In paragraph 2 , we identified the places where modifications could take place without being (too) detectable, at least for multimedia data, as the other techniques presented belong to different paradigms. Generally speaking, these modifications take place at the level of the least significant bits of the bytes encoding certain document characteristics, such as the red component of a...

You do not have access to this resource.
Logo Techniques de l'Ingenieur

Exclusive to subscribers. 97% yet to be discovered!

You do not have access to this resource. Click here to request your free trial access!

Already subscribed?


Article included in this offer

"Security of information systems"

( 86 articles )

Complete knowledge base

Updated and enriched with articles validated by our scientific committees

Services

A set of exclusive tools to complement the resources

View offer details