A secure steganographic system is shown in Figure 1, which depicts step by step process of hiding process of concealed message on a cover medium. |
|
Compared with existing schemes, their scheme does not depend on the steganographic methods. |
|
A computer forensic consultant found a copy of what is called a steganographic program. |
|
The agents told the company of the site where Frank had posted the steganographic picture containing hidden information. |
|
On a high level, undetectability means that no efficient algorithm can distinguish between inter-packet delays of the legitimate traffic and steganographic traffic. |
|
This downloader now delivers other malware via steganographic techniques. |
|