Skip to main content

Stretching the limits of steganography

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1174))

Abstract

We present a number of insights into information hiding. It was widely believed that public key steganography was impossible; we show how to do it. We then look at a number of possible approaches to the theoretical security of hidden communications. This turns out to hinge on the inefficiency of practical compression algorithms, and one of the most important parameters is whether the opponent is active or passive (i.e., whether the censor can add noise, or will merely allow or disallow a whole messages). However, there are covertexts whose compression characteristics are such that even an active opponent cannot always eliminate hidden channels completely.

This is a preview of subscription content, log in via an institution.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. “The Newton Channel”, RJ Anderson, S Vaudenay, B Preneel, K Nyberg, this volume

    Google Scholar 

  2. “Tamper Resistant Software: An Implementation”, D Aucsmith, this volume

    Google Scholar 

  3. “Watermarking Digital Images for Copyright Protection”, FM Boland, JJK Ó Ruanaidh, C Dautzenberg, Proceedings, IEE International Conference on Image Processing and its Applications, Edinburgh 1995

    Google Scholar 

  4. “Computer Based Steganography”, E Franz, A Jerichow, S Moeller, A Pfitzmann, I Stierand, this volume

    Google Scholar 

  5. “A voluntary international numbering system — the latest WIPO proposals”, R Hart, Computer Law and Security Report v 11 no 3 (May–June 95) pp 127–129

    Google Scholar 

  6. Talk on software birthmarks, counsel for IBM Corporation, BCS Technology of Software Protection Special Interest Group, London 1985

    Google Scholar 

  7. 'Steganography in Digital Images', G Jagpal, Thesis, Cambridge University Computer Laboratory, May 1995

    Google Scholar 

  8. 'The Codebreakers', D Kahn, Macmillan 1967

    Google Scholar 

  9. “Towards Robust and Hidden Image Copyright Labeling”, E Koch, J Zhao, Proceedings of 1995 IEEE Workshop on Nonlinear Signal and Image Processing (Neos Marmaras, Halkidiki, Greece, June 20–22, 1995)

    Google Scholar 

  10. “Electronic Document Distribution”, NF Maxemchuk, AT & T Technical Journal v 73 no 5 (Sep/Oct 94) pp 73–80

    Google Scholar 

  11. “Covert Channels — Here to Stay?”, IS Moskowitz, MH Kang, Compass 94 pp 235–243

    Google Scholar 

  12. RM Needham, private conversation, December 1995

    Google Scholar 

  13. 'Applied Cryptography — Protocols, Algorithms and Source Code in C'’ B Schneier (second edition), Wiley 1995

    Google Scholar 

  14. “A Mathematical Theory of Communication”, CE Shannon, in Bell Systems Technical Journal v 27 (1948) pp 379–423, 623–656

    Google Scholar 

  15. “Communication theory of secrecy systems”, CE Shannon, in Bell Systems Technical Journal v 28 (1949) pp 656–715

    Google Scholar 

  16. “The Prisoners' Problem and the Subliminal Channel”, GJ Simmons, in Proceedings of CRYPTO '83, Plenum Press (1984) pp 51–67

    Google Scholar 

  17. “How to Insure that Data Acquired to Verify Treaty Compliance are Trustworthy”, GJ Simmons, Proceedings of the IEEE v 76 (1984) p 5

    Google Scholar 

  18. “A survey of information authentication”, GJ Simmons, in Contemporary Cryptology — the Science of information Integrity, IEEE Press 1992, pp 379–419

    Google Scholar 

  19. “The History of Subliminal Channels”, GJ Simmons, this volume

    Google Scholar 

  20. 'High Quality De-interlacing of Television Images', N van Someren, PhD Thesis, University of Cambridge, September 1994

    Google Scholar 

  21. K Spärck Jones, private communication, August 1995

    Google Scholar 

  22. “Modelling a Fuzzy Time System”, JT Trostle, Proc. IEEE Symposium in Security and Privacy 93 pp 82–89

    Google Scholar 

  23. “Embedding Robust Labels Into Images For Copyright Protection”, J Zhao, E Koch, Proc. Int. Congr. on IPR for Specialized Information, Knowledge and New Technologies (Vienna, Austria, August 21–25, 1995)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Ross Anderson

Rights and permissions

Reprints and permissions

Copyright information

© 1996 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Anderson, R. (1996). Stretching the limits of steganography. In: Anderson, R. (eds) Information Hiding. IH 1996. Lecture Notes in Computer Science, vol 1174. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-61996-8_30

Download citation

  • DOI: https://doi.org/10.1007/3-540-61996-8_30

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-61996-3

  • Online ISBN: 978-3-540-49589-5

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics