Exam (elaborations)
Forensics and Network Intrusion
- Module
- Institution
Stego-only Only the stego-object is available for analysis. Known cover attack: The stego-object as well as the original medium is available. The stego-object is compared with the original cover object to detect any hidden information. Known message attack The hidden message and the correspondin...
[Show more]