摘要: We present a number of insights into information hiding. It was widely believed that public key steganography impossible; we show how to do it. then look at possible approaches the theoretical security hidden communications. This turns out hinge on inefficiency practical compression algorithms, and one most important parameters is whether opponent active or passive (i.e., censor can add noise, will merely allow disallow whole messages). However, there are covertexts whose characteristics such even an cannot always eliminate channels completely.