A new paradigm hidden in steganography
- 20 February 2001
- conference paper
- conference paper
- Published by Association for Computing Machinery (ACM)
Abstract
We discuss how steganography, in contrast to similar disciplines, requires a new paradigm based upon discontinuities and the absence of noise as a detection deterrent.Keywords
This publication has 12 references indexed in Scilit:
- An Information-Theoretic Approach to Steganography and WatermarkingLecture Notes in Computer Science, 2000
- Modeling the Security of Steganographic SystemsLecture Notes in Computer Science, 1998
- Steganalysis and Game EquilibriaLecture Notes in Computer Science, 1998
- An Information-Theoretic Model for SteganographyLecture Notes in Computer Science, 1998
- On the limits of steganographyIEEE Journal on Selected Areas in Communications, 1998
- Critical analysis of security in voice hiding techniquesPublished by Springer Science and Business Media LLC ,1997
- Information hiding terminologyLecture Notes in Computer Science, 1996
- The history of steganographyLecture Notes in Computer Science, 1996
- Description of a new variable-length key, 64-bit block cipher (Blowfish)Lecture Notes in Computer Science, 1994
- Communication Theory of Secrecy Systems*Bell System Technical Journal, 1949