LSB Modification Example
Introduction to Steganography
Message
File
(M1)
Container
File
(C1)
1 Bit from Message 1 File
1 Byte from Container 1 File
Container
File
(C2)
Steganography
Process
1 Byte toContainer 2 File
Third Example (LSB Modification)
Previous slide
Next slide
Back to first slide
View graphic version