Abstract
This paper gives an overview of cryptographically strong mass application invisibility in digital communication. It summarizes principles and methodology, clarifies terminology, and defines some new concepts. A new algorithm for hiding bit selection in digital images is proposed and an experimental implementation of the algorithm is described. Finally, the paper closes with a discussion of the implications of the availability of invisible communication.
An early version of this paper was presented at the HUT Seminar on Network Security in November 1995 [1].
Preview
Unable to display preview. Download preview PDF.
References
Tuomas Aura. Invisible communication. In Proceedings of the HUT Seminar on Network Security '95, Espoo, Finland, November 1995. Telecommunications Software and Multimedia laboratory, Helsinki University of Technology.
Hannes Federrath and Jürgen Thees. Schutz der Vertraulichkeit des Aufenhaltsorts von Mobilfunkteilnehmern. Datenschutz und Datensicherung, (6):338–348, June 1995.
Maxwell T. Sandford II, Jonathan N. Bradley, and Theodore G. Handel. The data embedding method. In Proceedings of the SPIE Photonics East Conference, Philadelphia, September 1995.
Paul C. Kocher. Personal communication, October 1995.
Michael Luby and Charles Rackoff. How to construct pseudorandom permutations from pseudorandom functions. SIAM Journal on Computing, 17(2):373–386, April 1988.
Steffen Möller, Andreas Pfitzmann, and Ingo Stierand. Rechnergstützte Steganographie: Wie sie funktioniert und warum folglich jede Reglementierung von Verschlüsselung unsinnig ist. Dateschutz und Datensicherung, (6):318–326, June 1994.
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 1996 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Aura, T. (1996). Practical invisibility in digital communication. In: Anderson, R. (eds) Information Hiding. IH 1996. Lecture Notes in Computer Science, vol 1174. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-61996-8_46
Download citation
DOI: https://doi.org/10.1007/3-540-61996-8_46
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-61996-3
Online ISBN: 978-3-540-49589-5
eBook Packages: Springer Book Archive