• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations
Advanced Search Include Citations | Disambiguate

DMCA

Information Hiding -- A Survey (1999)

Cached

  • Download as a PDF

Download Links

  • [www.cl.cam.ac.uk]
  • [www.petitcolas.net]
  • [www.cs.princeton.edu]
  • [www.cl.cam.ac.uk]
  • [www.cs.princeton.edu]
  • [profs.sci.univr.it]
  • [profs.sci.univr.it]
  • [gray-world.net]
  • [www.cs.bgu.ac.il]
  • [gray-world.net]
  • [www.fh-wedel.de]
  • [gray-world.net]
  • [gray-world.net]
  • [gray-world.net]
  • [www.cl.cam.ac.uk]
  • [www.fh-wedel.de]

  • Save to List
  • Add to Collection
  • Correct Errors
  • Monitor Changes
by Fabien A. P. Petitcolas , Ross J. Anderson , Markus G. Kuhn
Citations:294 - 0 self
  • Summary
  • Citations
  • Active Bibliography
  • Co-citation
  • Clustered Documents
  • Version History

BibTeX

@MISC{Petitcolas99informationhiding,
    author = {Fabien A. P. Petitcolas and Ross J. Anderson and Markus G. Kuhn},
    title = {Information Hiding -- A Survey},
    year = {1999}
}

Share

Facebook Twitter Reddit Bibsonomy

OpenURL

 

Abstract

Information hiding techniques have recently become important in a number of application areas. Digital audio, video, and pictures are increasingly furnished with distinguishing but imperceptible marks, which may contain a hidden copyright notice or serial number or even help to prevent unauthorised copying directly. Military communications systems make increasing use of traffic security techniques which, rather than merely concealing the content of a message using encryption, seek to conceal its sender, its receiver or its very existence. Similar techniques are used in some mobile phone systems and schemes proposed for digital elections. Criminals try to use whatever traffic security properties are provided intentionally or otherwise in the available communications systems, and police forces try to restrict their use. However, many of the techniques proposed in this young and rapidly evolving field can trace their history back to antiquity; and many of them are surprisingly easy to circumvent. In this article, we try to give an overview of the field; of what we know, what works, what does not, and what are the interesting topics for research.

Keyphrases

mobile phone system    digital audio    application area    hidden copyright notice    similar technique    available communication system    police force    military communication system    serial number    interesting topic    traffic security property    imperceptible mark    digital election    traffic security technique   

Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University