First page Back Continue Last page Graphics
Identifying Redundant Bits
Many different techniques exist for identifying which redundant bits to use for embedding a message:
- Using all of them
- Using a pre-determined formula or key to use some of them
- Random distribution
- Complex formulas
- Cover-image analysis in an attempt to defeat Steganalysis