On the limits of steganography
- 1 May 1998
- journal article
- research article
- Published by Institute of Electrical and Electronics Engineers (IEEE) in IEEE Journal on Selected Areas in Communications
- Vol. 16 (4) , 474-481
- https://doi.org/10.1109/49.668971
Abstract
In this paper, we clarify what steganography is and what it can do. We contrast it with the related disciplines of cryptography and traffic security, present a unified terminology agreed at the first international workshop on the subject, and outline a number of approaches-many of them developed to hide encrypted copyright marks or serial numbers in digital audio or video. We then present a number of attacks, some new, on such information hiding schemes. This leads to a discussion of the formidable obstacles that lie in the way of a general theory of information hiding systems (in the sense that Shannon gave us a general theory of secrecy systems). However, theoretical considerations lead to ideas of practical value, such as the use of parity checks to amplify covertness and provide public key steganography. Finally, we show that public key information hiding systems exist, and are not necessarily constrained to the case where the warden is passive.Keywords
This publication has 25 references indexed in Scilit:
- Copyright protection for the electronic distribution of text documentsProceedings of the IEEE, 1999
- Results concerning the bandwidth of subliminal channelsIEEE Journal on Selected Areas in Communications, 1998
- Auditory masking and MPEG-1 audio compressionElectronics & Communication Engineering Journal, 1997
- Chameleon — A new kind of stream cipherPublished by Springer Nature ,1997
- Computer based steganography: How it works and why therefore any restrictions on cryptography are nonsense, at bestPublished by Springer Nature ,1996
- A voluntary international numbering system — the latest WIPO proposalsComputer Law & Security Review, 1995
- A survey of information authenticationProceedings of the IEEE, 1988
- How to insure that data acquired to verify treaty compliance are trustworthyProceedings of the IEEE, 1988
- Communication Theory of Secrecy Systems*Bell System Technical Journal, 1949
- A Mathematical Theory of CommunicationBell System Technical Journal, 1948