Steganography and Steganalysis
This is a brief draft of a paper I’ve been working on recently. It introduces steganography as a means to transmitting data covertly and methods to detect it. I’ve deliberately kept all the math out; I’m hoping this doesn’t make things too unclear. Certain parts of this text have been taken from the original, in the part about a few programs available on the net for instance, I’ve directly quoted material from the manufacturers themselves. References have been included as and where necessary. Any comments or criticism would be appreciated.