Stretching the Limits of Steganography

作者: Ross Anderson

DOI: 10.1007/3-540-61996-8_30

关键词:

摘要: We present a number of insights into information hiding. It was widely believed that public key steganography impossible; we show how to do it. then look at possible approaches the theoretical security hidden communications. This turns out hinge on inefficiency practical compression algorithms, and one most important parameters is whether opponent active or passive (i.e., censor can add noise, will merely allow disallow whole messages). However, there are covertexts whose characteristics such even an cannot always eliminate channels completely.

参考文章(18)
Eckhard Koch, Jian Zhao, Embedding robust labels into images for copyright protection KnowRight '95 Proceedings of the conference on Intellectual property rights and new technologies. pp. 242- 251 ,(1995)
David Aucsmith, Tamper Resistant Software: An Implementation information hiding. pp. 317- 333 ,(1996) , 10.1007/3-540-61996-8_49
Gustavus J. Simmons, The Prisoners’ Problem and the Subliminal Channel international cryptology conference. pp. 51- 67 ,(1984) , 10.1007/978-1-4684-4730-9_5
G.J. Simmons, How to insure that data acquired to verify treaty compliance are trustworthy Proceedings of the IEEE. ,vol. 76, pp. 621- 627 ,(1988) , 10.1109/5.4446
CE Shennon, Warren Weaver, A mathematical theory of communication Bell System Technical Journal. ,vol. 27, pp. 379- 423 ,(1948) , 10.1002/J.1538-7305.1948.TB01338.X
Nicholas F. Maxemchuk, Electronic document distribution AT&T technical journal. ,vol. 73, pp. 73- 80 ,(1994) , 10.1002/J.1538-7305.1994.TB00612.X
G.J. Simmons, A survey of information authentication Proceedings of the IEEE. ,vol. 76, pp. 603- 620 ,(1988) , 10.1109/5.4445
Robert J Hart, A voluntary international numbering system — the latest WIPO proposals Computer Law & Security Review. ,vol. 11, pp. 127- 129 ,(1995) , 10.1016/S0267-3649(00)80031-X