“…Different approaches to steganalysis can be found in the literature as visual attack (Fridrich, 2002(Fridrich, , 2004, statistical analysis (Katzenbeisser 2000), and signature detection (Chandramouli 2004). The first approaches the most elementary methods, as for example the bit substitution systems that may cause visible distortions to images, what reveals the existence of hidden contents.…”