ECCouncil 312-49v10 Practice Test 15
Question 1 / 40
In which of these attacks will a steganalyst use a random message to generate a stego-object by using some steganography tool, to find the steganography algorithm used to hide the information?