On The Limits of Steganography.pdf

On The Limits of Steganography.pdf

ID:34213447

大小:155.76 KB

页数:9页

时间:2019-03-04

On The Limits of Steganography.pdf_第1页
On The Limits of Steganography.pdf_第2页
On The Limits of Steganography.pdf_第3页
On The Limits of Steganography.pdf_第4页
On The Limits of Steganography.pdf_第5页
资源描述:

《On The Limits of Steganography.pdf》由会员上传分享,免费在线阅读,更多相关内容在学术论文-天天文库

1、IEEEJournalofSelectedAreasinCommunications,16(4):474-481,May1998.474SpecialIssueonCopyright&PrivacyProtection.ISSN0733-8716.OnTheLimitsofSteganographyRossJ.Anderson,FabienA.P.PetitcolasAbstract

2、Inthispaper,weclarifywhatsteganographyisisdead"tofatherisdeceased,"whichelicitedthereplyan

3、dwhatitcando.Wecontrastitwiththerelateddisci-sfatherdeadordeceased?"[24].plinesofcryptographyandtracsecurity,presentauni edterminologyagreedatthe rstinternationalworkshoponThestudyofthissubjectinthescienti cliteraturemaythesubject,andoutlineanumberofapproaches

4、manyofbetracedtoSimmons

5、,whoin1983formulateditasthethemdevelopedtohideencryptedcopyrightmarksorse-risoners'Problem"[44].Inthisscenario,AliceandBobrialnumbersindigitalaudioorvideo.Wethenpresentaareinjail,andwishtohatchanescapeplan;alltheircom-numberofattacks,somenew,onsuchinformationhidingschemes.Thisleadstoa

6、discussionoftheformidableobsta-municationspassthroughthewarden,Willie;andifWillieclesthatlieinthewayofageneraltheoryofinformationdetectsanyencryptedmessages,hewillfrustratetheirplanhidingsystems(inthesensethatShannongaveusageneralbythrowingthemintosolitarycon nement.Sotheymusttheoryof

7、secrecysystems).However,theoreticalconsider-ationsleadtoideasofpracticalvalue,suchastheuseof ndsomewayofhidingtheirciphertextinaninnocuousparitycheckstoamplifycovertnessandprovidepublickeylookingcovertext.Asintherelated eldofcryptography,steganography.Finally,weshowthatpublickeyinform

8、ationweassumethatthemechanisminuseisknowntothewar-hidingsystemsexist,andarenotnecessarilyconstrainedtothecasewherethewardenispassive.den,andsothesecuritymustdependsolelyonasecretkeythatAliceandBobhavesomehowmanagedtoshare.Keywords

9、Cryptography,Copyrightprotection,Datacompression,Image

10、registration,Jitter,Motionpictures,Therearemanyreallifeapplicationsofsteganography.Multimediasystems,Music,Observability,PseudonoiseApparently,duringthe1980's,MargaretThatcherbecamecodedcommunication,Redundancy,Spreadspectrumcom-soirritatedatpressleaksofcabinetdocumentsthatshemunicati

11、on,So

当前文档最多预览五页,下载文档查看全文

此文档下载收益归作者所有

当前文档最多预览五页,下载文档查看全文
温馨提示:
1. 部分包含数学公式或PPT动画的文件,查看预览时可能会显示错乱或异常,文件下载后无此问题,请放心下载。
2. 本文档由用户上传,版权归属用户,天天文库负责整理代发布。如果您对本文档版权有争议请及时联系客服。
3. 下载前请仔细阅读文档内容,确认文档内容符合您的需求后进行下载,若出现内容与标题不符可向本站投诉处理。
4. 下载文档时可能由于网络波动等原因无法下载或下载错误,付费完成后未能成功下载的用户请联系客服处理。