A new paradigm hidden in steganography
- 20 February 2001
- conference paper
- Published by Association for Computing Machinery (ACM)
Abstract
We discuss how steganography, in contrast to similar disciplines, requires a new paradigm based upon discontinuities and the absence of noise as a detection deterrent.Keywords
This publication has 12 references indexed in Scilit:
- An Information-Theoretic Approach to Steganography and WatermarkingPublished by Springer Nature ,2000
- Modeling the Security of Steganographic SystemsPublished by Springer Nature ,1998
- Steganalysis and Game EquilibriaPublished by Springer Nature ,1998
- An Information-Theoretic Model for SteganographyPublished by Springer Nature ,1998
- On the limits of steganographyIEEE Journal on Selected Areas in Communications, 1998
- Critical analysis of security in voice hiding techniquesPublished by Springer Nature ,1997
- Information hiding terminologyPublished by Springer Nature ,1996
- The history of steganographyLecture Notes in Computer Science, 1996
- Description of a new variable-length key, 64-bit block cipher (Blowfish)Published by Springer Nature ,1994
- Communication Theory of Secrecy Systems*Bell System Technical Journal, 1949