
6. Glossary – Definitions
Attacker
In the context of steganography, an entity seeking to detect the use of steganography.
Error-correcting code
Data encoding for reliable transmission in noisy environments. Through matrix embedding, wet paper codes and STC codes, steganography has become a field of application for corrective codes.
Kullback-Leiber divergence
Measure of the difference between two probability distributions. Sometimes called "distance", although it does not have all the required properties. Also known as relative entropy. Has many applications, notably in information theory.
Cover document
Non-steganographic data that can be used to insert a hidden message. Sometimes abbreviated to "cover".
DCT (Discrete...
Exclusive to subscribers. 97% yet to be discovered!
You do not have access to this resource.
Click here to request your free trial access!
Already subscribed? Log in!

The Ultimate Scientific and Technical Reference
This article is included in
Security of information systems
This offer includes:
Knowledge Base
Updated and enriched with articles validated by our scientific committees
Services
A set of exclusive tools to complement the resources
Practical Path
Operational and didactic, to guarantee the acquisition of transversal skills
Doc & Quiz
Interactive articles with quizzes, for constructive reading
Glossary – Definitions
Bibliography
Software tools
Bmap, slacker – Steganography software for file systems http://www.target0.be/madchat/crypto/stegano/unix/ covert/bmap-1.0.20.tar.bz2
Websites
FRIDRICH (J.) Professional web page containing all Jessica Fridrich's scientific publications. Most of her work is application-oriented. http://www.ws.binghamton.edu/fridrich/
KER (A.) Professional web page containing all of Andrew Ker's scientific publications. Ker's work provides a more theoretical approach while keeping...
Events
The ACM Workshop on Information Hiding and Multimedia Security. Merger of two major historical conferences (Information Hiding and Multimedia Security). Held annually (changing venues). http://www.ihmmsec.org
Standards and norms
- Digital Signature Algorithm. Federal information processing standards 186, NIST, US Departement of Commerce - DSA - 1994
Exclusive to subscribers. 97% yet to be discovered!
You do not have access to this resource.
Click here to request your free trial access!
Already subscribed? Log in!

The Ultimate Scientific and Technical Reference