1996
DOI: 10.1007/3-540-61996-8_28
|View full text |Cite
|
Sign up to set email alerts
|

Computer based steganography: How it works and why therefore any restrictions on cryptography are nonsense, at best

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
15
0

Year Published

1998
1998
2013
2013

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 50 publications
(15 citation statements)
references
References 1 publication
0
15
0
Order By: Relevance
“…The idea of adaptive embedding, where each cover element is assigned a different embedding cost, dates to the early days of digital steganography [31]. A breakthrough technique was to use syndrome-trellis codes (STCs) [29], which solve certain versions of the adaptive embedding problem.…”
Section: Optimal Embeddingmentioning
confidence: 99%
See 2 more Smart Citations
“…The idea of adaptive embedding, where each cover element is assigned a different embedding cost, dates to the early days of digital steganography [31]. A breakthrough technique was to use syndrome-trellis codes (STCs) [29], which solve certain versions of the adaptive embedding problem.…”
Section: Optimal Embeddingmentioning
confidence: 99%
“…This happens, for example, when tunnelling bilateral protocols through steganographic channels. Few publications have addressed the stream steganography problem (in analogy to stream ciphers) [31,52]. One interesting result is known for payload allocation in infinite streams with imperfect embedding (and applies only to an artificial setup where distortion is exactly square in the amount of payload per object): the higher the rate that payload is sent early, the lower the eventual asymptotic square root rate [52].…”
Section: Multiple Objectsmentioning
confidence: 99%
See 1 more Smart Citation
“…This method exploits the technique of data hiding to bypass the watermark detector in the recorder. The method of attack is similar to a technique used in countries where the private use of cryptographic encryption is outlawed [11]. The copyrighted work is hidden in an innocent-looking file of a known recognized format.…”
Section: Attacks On the Copy Control Mechanismmentioning
confidence: 99%
“…Traditional hiding and steganography methods, e.g., [4,5] have the disadvantage that once their method is known, anyone can find the embedded message.…”
Section: Introductionmentioning
confidence: 99%