On the limits of steganography

被引:542
作者
Anderson, RJ [1 ]
Petitcolas, FAP [1 ]
机构
[1] Univ Cambridge, Comp Lab, Cambridge CB2 3QZ, England
关键词
copyright protection; cryptography; data compression; image registration; jitter; motion pictures; multimedia systems; music; observability; pseudonoise coded communication; redundancy; spread spectrum communication; software protection;
D O I
10.1109/49.668971
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this paper, we clarify what steganography is and what it cars do. We contrast it with the related disciplines of cryptography and traffic security, present a unified terminology agreed at the first international workshop on the subject, and outline a number of approaches-many of them developed to hide encrypted copyright marks or serial numbers in digital audio or video. We then present a number of attacks, some new, on such information hiding schemes. This leads to a discussion of the formidable obstacles that lie in the way of a general theory of information hiding systems (in the sense that Shannon gave us a general theory of secrecy systems). However, theoretical considerations lead to ideas of practical value, such as the use of parity checks to amplify covertness and provide public key steganography. Finally, we show that public key information hiding systems exist, and are not necessarily constrained to the case where the warden is passive.
引用
收藏
页码:474 / 481
页数:8
相关论文
共 51 条
  • [1] Auditory masking and MPEG-1 audio compression
    Ambikairajah, E
    Davis, AG
    Wong, WTK
    [J]. ELECTRONICS & COMMUNICATION ENGINEERING JOURNAL, 1997, 9 (04): : 165 - 175
  • [2] Anderson R, 1996, PROCEEDINGS OF THE SECOND USENIX WORKSHOP ON ELECTRONIC COMMERCE, P1
  • [3] ANDERSON R, 1997, IN PRESS P 4 WORKSH
  • [4] ANDERSON RJ, COMPUTER SECURITY ES, V875, P231
  • [5] [Anonymous], METEOR BURST COMMUNI
  • [6] [Anonymous], 20931 IBM RC
  • [7] [Anonymous], SPRINGER LECT NOTES
  • [8] AUCSMITH D, 1996, SPRINGER LECT NOTES, V1174, P317
  • [9] Techniques for data hiding
    Bender, W
    Gruhl, D
    Morimoto, N
    Lu, A
    [J]. IBM SYSTEMS JOURNAL, 1996, 35 (3-4) : 313 - 336
  • [10] BOLAND FM, 1995, P IEE INT C IM PROC