5. Conclusion
This introduction to steganography shows the variety of techniques used. It is clear that the origin of this variety is twofold: on the one hand, it is linked to the types of data, and on the other, to the representation formats adopted. As the latter frequently evolve, so do the techniques, and their number continues to grow. As a result, we have only presented a limited corpus of techniques, albeit fairly representative of the digital domain.
One definition of steganographic system security is based on the probability distribution of the original documents and the documents obtained after concealment: the system is secure if these distributions are indistinguishable. This security model makes it possible to construct theoretical systems with perfect security. Unfortunately, these systems have no practical use. On the other hand, a major problem with this model...
Exclusive to subscribers. 97% yet to be discovered!
You do not have access to this resource.
Click here to request your free trial access!
Already subscribed? Log in!
The Ultimate Scientific and Technical Reference
This article is included in
Security of information systems
This offer includes:
Knowledge Base
Updated and enriched with articles validated by our scientific committees
Services
A set of exclusive tools to complement the resources
Practical Path
Operational and didactic, to guarantee the acquisition of transversal skills
Doc & Quiz
Interactive articles with quizzes, for constructive reading
Conclusion
Bibliography
Software tools
Bmap, slacker – Steganography software for file systems http://www.target0.be/madchat/crypto/stegano/unix/ covert/bmap-1.0.20.tar.bz2
Websites
FRIDRICH (J.) Professional web page containing all Jessica Fridrich's scientific publications. Most of her work is application-oriented. http://www.ws.binghamton.edu/fridrich/
KER (A.) Professional web page containing all of Andrew Ker's scientific publications. Ker's work provides a more theoretical approach while keeping...
Events
The ACM Workshop on Information Hiding and Multimedia Security. Merger of two major historical conferences (Information Hiding and Multimedia Security). Held annually (changing venues). http://www.ihmmsec.org
Standards and norms
- Digital Signature Algorithm. Federal information processing standards 186, NIST, US Departement of Commerce - DSA - 1994
Exclusive to subscribers. 97% yet to be discovered!
You do not have access to this resource.
Click here to request your free trial access!
Already subscribed? Log in!
The Ultimate Scientific and Technical Reference