Information Technology Journal1812-56381812-5646Asian Network for Scientific Information10.3923/itj.2005.284.288Al-HamammiAla`a Al-HamadaniMaisa`a Hamed3200543The application of possible attacks and their success is necessary to evaluate the security of any steganography system. There are many types of application packages attacks such as filters and software used to destroy the hidden data in cover image, when the attacker couldn't detect the existence of the secret data. For that the easy way for the attacker is to submit the suspected image to different types of attack. Some of these attacks could be smoothing filters, image conversion, re-sizing, mosaic and visual pixel detection. Hiding in edge points, direct hiding and hiding in reference images are three methods of steganography. The three methods are applied for single and double hiding as a proposed steganography system that submitted to these kinds of attacks to prove and evaluate the strength of the proposed system. Finally the proposed system is proven success against some types of attack, but not all.]]>Franz, E. and A. Pfitzmann,20002000pp: 29-46pp: 29-46Misamore, M.,20022002Provos, N. and P. Honeyman,2001Fridrich, J. and R. Du,20002000pp: 47-60pp: 47-60Provos, N.,2001Stefan, K. and A. Fabin,2000Fridrich, J., R. Du and M. Long,20002000Blacke, T.M.,20012001Shin, N.,20002000pp: 17-28pp: 17-28Al-Hamadani, M.H.,20032003Petitcolas, F.A., R.J. Anderson and M.G. Kuhn,19981998pp: 218-238pp: 218-238Alaa Al-Hamami, M.,20022002