We are also surrounded by a world of secret communication, where people of all types are transmitting information as innocent as an encrypted credit card number to an online store. This dissertation is a contribution to the field of information security as new data hiding techniques are emerging to cope with the various challenges rising from the popularization of multimedia transmission, which have been widely applied for information protection, data monitoring and tracking, copyright protection, and source authentication. Stegacrypt first encrypt the text file and then employed a...
We are also surrounded by a world of secret communication, where people of all types are transmitting information as innocent as an encrypted credit c...