期刊名称:International Journal of Innovative Research in Computer and Communication Engineering
印刷版ISSN:2320-9798
电子版ISSN:2320-9801
出版年度:2015
卷号:3
期号:8
DOI:10.15680/IJIRCCE.2015. 0308128
出版社:S&S Publications
摘要:As we all know, Steganography is being used in terrorist activities these days. Terrorist used to hideinformation behind carrier image in form of text or image which may be transferred sent or received through SocialNetworking Sites such as Facebook, Tweeter, Linkedin, etc. but unfortunately, no social networking sites have controlover such Stego Image transfer. In this paper, we have discussed why RAKS. M. PK v2.0 is better and efficient overother techniques to detect whether an image is stego or normal by explaining the working mechanism of RAKS. M.PK 2.0. With the help of this research we put your effort to focus on those issues that make it difficult to find theSteganography Signature of the different Steganography tools. Also, we have tried to find out the SteganographySignature of “Securengine Pro” by the analysis of different graphs, patterns and study of prepared analysis table
关键词:Steganography; RAKS. M. PK 2.0; Steganography Signature; Known Cover Attack; Security Threats