Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Recommended Reading
Anderson RJ, Petitcolas FA (1998) On the limits of steganography. IEEE J Sel Areas Commun 16(4):474–481
Backes M, Cachin C (2005) Public-key steganography with active attacks. In: Kilian J (ed) Proceedings 2nd theory of cryptography conference (TCC 2005). Lecture notes in computer science, vol 3378. Springer, Heidelberg, pp 210–226
Cachin C (2004) An information-theoretic model for steganography. Information and Computation 192(1):41–56 (Preliminary version appeared in Proceedings 2nd Workshop on Information Hiding, 1998)
Hopper NJ, von Ahn L, Langford J (2009) Provably secure steganography. IEEE Transactions on Computers 58(5):662–676
Katzenbeisser S, Petitcolas FAP (2002) Defining security in steganographic systems. In: Delp EJ, Won PW (eds) Security and watermarking of multimedia contents IV. Proceedings of SPIE, international society for optical engineering, vol 4675. pp 260–268
Naor M, Shamir A (1995) Visual cryptography. In: De Santis A (ed) Advances in cryptology: eurocrpyt’94. Lecture notes in computer science, vol 950. Springer, Heidelberg, pp 1–12
Simmons GJ (1984) The prisoners’ problem and the subliminal channel. In: Chum D (ed) Advances in cryptology: proceedings of crypto’83, Plenum Press, New York, pp 51–67
von Ahn L, Hopper NJ (2004) Public-key steganography. In: Cachin C, Camenisch J (eds) Advances in cryptology: eurocrpt’2004. Lecture notes in computer science, vol 3027. Springer, Heidelberg, pp 322–339
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer Science+Business Media, LLC
About this entry
Cite this entry
Cachin, C. (2011). Digital Steganography. In: van Tilborg, H.C.A., Jajodia, S. (eds) Encyclopedia of Cryptography and Security. Springer, Boston, MA. https://doi.org/10.1007/978-1-4419-5906-5_317
Download citation
DOI: https://doi.org/10.1007/978-1-4419-5906-5_317
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4419-5905-8
Online ISBN: 978-1-4419-5906-5
eBook Packages: Computer ScienceReference Module Computer Science and Engineering