Title | ||
---|---|---|
Computer Based Steganography: How It Works and Why Therefore Any Restrictions on Cryptography Are Nonsense, at Best |
Abstract | ||
---|---|---|
In the future, messages, e.g. speech, text or pictures, will be transmitted digitally since this is cheaper, more perfect and more flexible. It is possible to hide messages, which are of necessity much shorter, nearly unrecognizable for outsiders in such digitized messages. In this article we describe how computer based steganography works and give a summary on the results of our implementation. |
Year | DOI | Venue |
---|---|---|
1996 | 10.1007/3-540-61996-8_28 | Information Hiding |
Keywords | Field | DocType |
hidden transmission,method with threshold values,listening tests,hissing noise,background noises,encryption,encoding,isdn,steganography,sonogram,cryptography,digitization | Steganography,Digitization,Integrated Services Digital Network,Steganography tools,Nonsense,Computer science,Cryptography,Encryption,Theoretical computer science,Encoding (memory) | Conference |
ISBN | Citations | PageRank |
3-540-61996-8 | 16 | 32.66 |
References | Authors | |
1 | 5 |
Name | Order | Citations | PageRank |
---|---|---|---|
Elke Franz | 1 | 113 | 54.42 |
Anja Jerichow | 2 | 86 | 49.49 |
Steffen Möller | 3 | 249 | 166.97 |
Andreas Pfitzmann | 4 | 1076 | 337.69 |
Ingo Stierand | 5 | 62 | 41.67 |