A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is
2009 International Conference for Internet Technology and Secured Transactions, (ICITST)
A wide range of steganography techniques has been described in this paper. Beside the evaluation of embedding parameters for the existing techniques, two problems -weaknesses-of substitution techniques are investigated which if they could be solved, the large capacity -strength-of substitution techniques would be practical. Furthermore, a novel, principled approach to resolve the problems is presented. Using the proposed genetic algorithm, message bits are embedded into multiple, vague and higher LSB layers, resulting in increased robustness.doi:10.1109/icitst.2009.5402644 fatcat:moclvu5vgje67ndbibwqg62dyu