A new paradigm hidden in steganography

Abstract : We discuss how steganography, in contrast to similar disciplines, requires a new paradigm based upon discontinuities and the absence of noise as a detection deterrent.

[1]  Cynthia E. Irvine,et al.  Surmounting the Effects of Lossy Compression on Steganography , 1996 .

[2]  Hannes Federrath,et al.  Modeling the Security of Steganographic Systems , 1998, Information Hiding.

[3]  Imre Csiszár,et al.  Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.

[4]  Thomas Mittelholzer,et al.  An Information-Theoretic Approach to Steganography and Watermarking , 1999, Information Hiding.

[5]  Christian Cachin,et al.  An information-theoretic model for steganography , 1998, Inf. Comput..

[6]  Mark Ettinger,et al.  Steganalysis and Game Equilibria , 1998, Information Hiding.

[7]  Marten van Dijk On a special class of broadcast channels with confidential messages , 1997, IEEE Trans. Inf. Theory.

[8]  Robert Rosen,et al.  Structural stability and morphogenesis , 1977 .

[9]  Stephan Katzenbeisser,et al.  Information Hiding Techniques for Steganography and Digital Watermaking , 1999 .

[10]  김인택 [서평]「Information Hiding Techniques for Steganography and Digital Watermarking」 , 2000 .

[11]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[12]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[13]  Birgit Pfitzmann,et al.  Information Hiding Terminology - Results of an Informal Plenary Meeting and Additional Proposals , 1996, Information Hiding.

[14]  John McHugh,et al.  A cautionary note on image downgrading , 1992, [1992] Proceedings Eighth Annual Computer Security Application Conference.

[15]  Ross Anderson,et al.  Information hiding terminology , 1996 .

[16]  David Kahn,et al.  The History of Steganography , 1996, Information Hiding.

[17]  Ira S. Moskowitz,et al.  Critical analysis of security in voice hiding techniques , 1997, ICICS.

[18]  Ross J. Anderson Stretching the Limits of Steganography , 1996, Information Hiding.

[19]  Gustavus J. Simmons,et al.  A Secure Subliminal Channel (?) , 1985, CRYPTO.

[20]  Bruce Schneier,et al.  Description of a New Variable-Length Key, 64-bit Block Cipher (Blowfish) , 1993, FSE.

[21]  Gustavus J. Simmons,et al.  The Prisoners' Problem and the Subliminal Channel , 1983, CRYPTO.

[22]  Ross J. Anderson,et al.  On the limits of steganography , 1998, IEEE J. Sel. Areas Commun..