Mostrar el registro sencillo del ítem
Evaluation of Different Steganalysis Methods
dc.rights.license | All rights reserved | en_US |
dc.contributor.advisor | Ramírez, Juan | |
dc.contributor.author | Vélez Torres, Jesús | |
dc.date.accessioned | 2020-10-22T11:31:31Z | |
dc.date.available | 2020-10-22T11:31:31Z | |
dc.date.issued | 2012 | |
dc.identifier.citation | Vélez Torres, J. (2012). Evaluation of different steganalysis methods [Unpublished manuscript]. Graduate School, Polytechnic University of Puerto Rico. | en_US |
dc.identifier.uri | http://hdl.handle.net/20.500.12475/877 | |
dc.description | Design Project Article for the Graduate Programs at Polytechnic University of Puerto Rico | en_US |
dc.description.abstract | Abstract - After the September 11, 2001 terrorist attack on the World Trade Center the United States declared war on terrorism. The Patriot Act (H.R. 3162) was passed, which authorizes law enforcement agencies to monitor and intercept the electronic communications of suspected terrorists. This meant that telephone communication and encrypted telephony would no longer be safe for terrorists to communicate with each other. This provoked them to search for alternate means to communicate sensitive information. The New York Times, USA Today, and the United States Institute of Peace have reported that terrorists may be using steganography and cryptography on the web as a means for convert communications [1, 2, 3]. These reports have been the basis of several studies into convert communication by terrorists. It is becoming increasingly important to detect the images that contain steganography such that we can reduce foul-play. This counter technique is known as steganalysis.There are two problems in steganalysis: detecting the existence of a hidden message and decoding the message. This research is only concerned with the first problem, which is the detection of hidden messages using statistical steganalysis. Key Terms - Carrier, Medium, Steganalysis, Steganography. | en_US |
dc.language.iso | en | en_US |
dc.publisher | Polytechnic University of Puerto Rico | en_US |
dc.relation.ispartof | Computer Science; | |
dc.relation.ispartofseries | Fall-2012; | |
dc.relation.haspart | San Juan | en_US |
dc.subject.lcsh | Cryptography--Statistical methods | en_US |
dc.subject.lcsh | Data encryption (Computer science) | en_US |
dc.subject.lcsh | Polytechnic University of Puerto Rico--Graduate students--Research | |
dc.title | Evaluation of Different Steganalysis Methods | en_US |
dc.type | Article | en_US |
dc.rights.holder | Polytechnic University of Puerto Rico, Graduate School | en_US |
Ficheros en el ítem
Este ítem aparece en la(s) siguiente(s) colección(ones)
-
Computer Science
Artículos de Proyectos de Ciencias en Computadoras