Abstract
As we all know, Steganography is being used in terrorist activities these days. Terrorist used to hide information behind carrier image in form of text or image which may be transferred sent or received through Social Networking Sites such as Facebook, Tweeter, Linkedin, etc. but unfortunately, no social networking sites have control over such Stego Image transfer. In this paper, we have discussed why RAKS. M. PK 1.0 is better and efficient over other techniques of to detect whether an image is stego or normal by explaining the working mechanism of RAKS. M. PK 1.0. With the help of this paper we put your effort to focus on those issues that make it difficult to find the Steganographic Signature of the different Steganography tools. Also, we have tried to find out the Steganographic Signature of “Securengine Pro” by the analysis of different graphs and patterns.
View more >>