Skip to main content

Practical invisibility in digital communication

  • Conference paper
  • First Online:
Information Hiding (IH 1996)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1174))

Included in the following conference series:

Abstract

This paper gives an overview of cryptographically strong mass application invisibility in digital communication. It summarizes principles and methodology, clarifies terminology, and defines some new concepts. A new algorithm for hiding bit selection in digital images is proposed and an experimental implementation of the algorithm is described. Finally, the paper closes with a discussion of the implications of the availability of invisible communication.

An early version of this paper was presented at the HUT Seminar on Network Security in November 1995 [1].

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Tuomas Aura. Invisible communication. In Proceedings of the HUT Seminar on Network Security '95, Espoo, Finland, November 1995. Telecommunications Software and Multimedia laboratory, Helsinki University of Technology.

    Google Scholar 

  2. Hannes Federrath and Jürgen Thees. Schutz der Vertraulichkeit des Aufenhaltsorts von Mobilfunkteilnehmern. Datenschutz und Datensicherung, (6):338–348, June 1995.

    Google Scholar 

  3. Maxwell T. Sandford II, Jonathan N. Bradley, and Theodore G. Handel. The data embedding method. In Proceedings of the SPIE Photonics East Conference, Philadelphia, September 1995.

    Google Scholar 

  4. Paul C. Kocher. Personal communication, October 1995.

    Google Scholar 

  5. Michael Luby and Charles Rackoff. How to construct pseudorandom permutations from pseudorandom functions. SIAM Journal on Computing, 17(2):373–386, April 1988.

    Article  Google Scholar 

  6. Steffen Möller, Andreas Pfitzmann, and Ingo Stierand. Rechnergstützte Steganographie: Wie sie funktioniert und warum folglich jede Reglementierung von Verschlüsselung unsinnig ist. Dateschutz und Datensicherung, (6):318–326, June 1994.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Ross Anderson

Rights and permissions

Reprints and permissions

Copyright information

© 1996 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Aura, T. (1996). Practical invisibility in digital communication. In: Anderson, R. (eds) Information Hiding. IH 1996. Lecture Notes in Computer Science, vol 1174. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-61996-8_46

Download citation

  • DOI: https://doi.org/10.1007/3-540-61996-8_46

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-61996-3

  • Online ISBN: 978-3-540-49589-5

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics