Abstract
In the future, messages, e.g. speech, text or pictures, will be transmitted digitally since this is cheaper, more perfect and more flexible. It is possible to hide messages, which are of necessity much shorter, nearly unrecognizable for outsiders in such digitized messages. In this article we describe how computer based steganography works and give a summary on the results of our implementation.
Most of the text was originally published by Steffen Möller, Andreas Pfitzmann and Ingo Stierand in German in the Journal “DuD, Datenschutz und Datensicherung” 18/6 (1994) 318–326.
We thank the German Science Foundation (DFG) and the Gottlieb-Daimler — and Karl-Benz Foundation, Ladenburg (Germany) for their financial support.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
Literature
Steffen Möller, Andreas Pfitzmann, Ingo Stierand: Rechnergestützte Steganographie: Wie sie funktioniert und warum folglich jede Reglementierung von Verschlüsselung unsinnig ist; Datenschutz und Datensicherung DuD 18/6 (1994) 318–326.
Peter Bocker: ISDN — The Integrated Services Digital Network; Concepts, Methods, Systems; In collaboration with G. Arndt, V. Frantzen, O. Fundneider, L. Hagenhaus, H. J. Rothamel, L. Schweizer; Springer-Verlag, Heidelberg 1988
Peter Wayner: Mimic Functions; Cryptologia XVI/3 1993, pp. 193–213
Newsgroup: sci.crypt.research
Romana Machado: Stego; http://www.fqa.com/romana/romanasoft/stego.html
Further information on steganography at www—serveers of the internet such as http://www.iquest.net/∼mrmil/stego.html and http://www.cs.hut.fi/ssh/crypto/software.html#stego
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 1996 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Franz, E., Jerichow, A., Möller, S., Pfitzmann, A., Stierand, I. (1996). Computer based steganography: How it works and why therefore any restrictions on cryptography are nonsense, at best. In: Anderson, R. (eds) Information Hiding. IH 1996. Lecture Notes in Computer Science, vol 1174. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-61996-8_28
Download citation
DOI: https://doi.org/10.1007/3-540-61996-8_28
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-61996-3
Online ISBN: 978-3-540-49589-5
eBook Packages: Springer Book Archive