Show simple item record

dc.rights.licenseAll rights reserveden_US
dc.contributor.advisorRamírez, Juan
dc.contributor.authorVélez Torres, Jesús
dc.date.accessioned2020-10-22T11:31:31Z
dc.date.available2020-10-22T11:31:31Z
dc.date.issued2012
dc.identifier.citationVélez Torres, J. (2012). Evaluation of different steganalysis methods [Unpublished manuscript]. Graduate School, Polytechnic University of Puerto Rico.en_US
dc.identifier.urihttp://hdl.handle.net/20.500.12475/877
dc.descriptionDesign Project Article for the Graduate Programs at Polytechnic University of Puerto Ricoen_US
dc.description.abstractAbstract - After the September 11, 2001 terrorist attack on the World Trade Center the United States declared war on terrorism. The Patriot Act (H.R. 3162) was passed, which authorizes law enforcement agencies to monitor and intercept the electronic communications of suspected terrorists. This meant that telephone communication and encrypted telephony would no longer be safe for terrorists to communicate with each other. This provoked them to search for alternate means to communicate sensitive information. The New York Times, USA Today, and the United States Institute of Peace have reported that terrorists may be using steganography and cryptography on the web as a means for convert communications [1, 2, 3]. These reports have been the basis of several studies into convert communication by terrorists. It is becoming increasingly important to detect the images that contain steganography such that we can reduce foul-play. This counter technique is known as steganalysis.There are two problems in steganalysis: detecting the existence of a hidden message and decoding the message. This research is only concerned with the first problem, which is the detection of hidden messages using statistical steganalysis. Key Terms - Carrier, Medium, Steganalysis, Steganography.en_US
dc.language.isoenen_US
dc.publisherPolytechnic University of Puerto Ricoen_US
dc.relation.ispartofComputer Science;
dc.relation.ispartofseriesFall-2012;
dc.relation.haspartSan Juanen_US
dc.subject.lcshCryptography--Statistical methodsen_US
dc.subject.lcshData encryption (Computer science)en_US
dc.subject.lcshPolytechnic University of Puerto Rico--Graduate students--Research
dc.titleEvaluation of Different Steganalysis Methodsen_US
dc.typeArticleen_US
dc.rights.holderPolytechnic University of Puerto Rico, Graduate Schoolen_US


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record