Steganography aims to secretly transmit messages by embedding them in cover data. The usual criterion each stegosystem must meet is to resist stego-only-attacks. An even stronger criterion is to resist cover-stego-attacks. The article introduces a stego paradigm which aims to meet this stronger requirement by simulating a „usual process“of data processing. The general realization of the paradigm is discussed. One possible realization is sketched.
CITATION STYLE
Franz, E., & Pfitzmann, A. (2000). Steganography secure against cover-stego-attacks. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 1768, pp. 29–46). Springer Verlag. https://doi.org/10.1007/10719724_3
Mendeley helps you to discover research relevant for your work.