Haldar, Manas Kumar
As the demand of more secure yet efficient image steganography tools has increased, different steganography approaches have been proposed. In this paper some of those approaches are examined in order to identify the appropriate image steganography technique to be implemented in an electronic voting system. Different set of criteria has been set into place to analyze and evaluate the strengths and weaknesses of the presented steganography approaches.
2011 International Conference on Computer Science and Network Technology (ICCSNT 2011), Harbin, China, 24-26 December 2011, Vol. 1, pp. 120-124
Copyright © 2011 IEEE.