1. Terminology
Steganography refers to the concealment of messages, but this can take several forms which, in some cases, need to be distinguished. The term "information hiding" is used to refer to all aspects of concealing information:
steganography in the strict sense of the term, i.e. concealment with the aim of keeping the existence of the communication confidential;
techniques for anonymizing communications ;
watermarking ;
watermarks (fingerprinting).
The question of anonymity calls for slightly different techniques, and we won't go into that here, but it is generally accepted that this issue comes under the heading of information hiding. Watermarking refers to the insertion of marks designed to identify the rightful...
Exclusive to subscribers. 97% yet to be discovered!
You do not have access to this resource.
Click here to request your free trial access!
Already subscribed? Log in!
The Ultimate Scientific and Technical Reference
This article is included in
Security of information systems
This offer includes:
Knowledge Base
Updated and enriched with articles validated by our scientific committees
Services
A set of exclusive tools to complement the resources
Practical Path
Operational and didactic, to guarantee the acquisition of transversal skills
Doc & Quiz
Interactive articles with quizzes, for constructive reading
Terminology
Bibliography
Software tools
Bmap, slacker – Steganography software for file systems http://www.target0.be/madchat/crypto/stegano/unix/ covert/bmap-1.0.20.tar.bz2
Websites
FRIDRICH (J.) Professional web page containing all Jessica Fridrich's scientific publications. Most of her work is application-oriented. http://www.ws.binghamton.edu/fridrich/
KER (A.) Professional web page containing all of Andrew Ker's scientific publications. Ker's work provides a more theoretical approach while keeping...
Events
The ACM Workshop on Information Hiding and Multimedia Security. Merger of two major historical conferences (Information Hiding and Multimedia Security). Held annually (changing venues). http://www.ihmmsec.org
Standards and norms
- Digital Signature Algorithm. Federal information processing standards 186, NIST, US Departement of Commerce - DSA - 1994
Exclusive to subscribers. 97% yet to be discovered!
You do not have access to this resource.
Click here to request your free trial access!
Already subscribed? Log in!
The Ultimate Scientific and Technical Reference