Research Output | Dar Al-hikmah Library | IIUM Only
This paper give an overview on hidden data in a different carrier, in particular the paper overview different technique for steganography and giving a brief explain about each one, in order to implements stego-analysis system, this paper highlight the weak on the hidden data technique(disadvantage, weak point, type of attacker, stage of attacking t