Skip to main content

Computer based steganography: How it works and why therefore any restrictions on cryptography are nonsense, at best

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1174))

Abstract

In the future, messages, e.g. speech, text or pictures, will be transmitted digitally since this is cheaper, more perfect and more flexible. It is possible to hide messages, which are of necessity much shorter, nearly unrecognizable for outsiders in such digitized messages. In this article we describe how computer based steganography works and give a summary on the results of our implementation.

Most of the text was originally published by Steffen Möller, Andreas Pfitzmann and Ingo Stierand in German in the Journal “DuD, Datenschutz und Datensicherung” 18/6 (1994) 318–326.

We thank the German Science Foundation (DFG) and the Gottlieb-Daimler — and Karl-Benz Foundation, Ladenburg (Germany) for their financial support.

This is a preview of subscription content, log in via an institution.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Literature

  • Steffen Möller, Andreas Pfitzmann, Ingo Stierand: Rechnergestützte Steganographie: Wie sie funktioniert und warum folglich jede Reglementierung von Verschlüsselung unsinnig ist; Datenschutz und Datensicherung DuD 18/6 (1994) 318–326.

    Google Scholar 

  • Peter Bocker: ISDN — The Integrated Services Digital Network; Concepts, Methods, Systems; In collaboration with G. Arndt, V. Frantzen, O. Fundneider, L. Hagenhaus, H. J. Rothamel, L. Schweizer; Springer-Verlag, Heidelberg 1988

    Google Scholar 

  • Peter Wayner: Mimic Functions; Cryptologia XVI/3 1993, pp. 193–213

    Google Scholar 

  • Newsgroup: sci.crypt.research

    Google Scholar 

  • Romana Machado: Stego; http://www.fqa.com/romana/romanasoft/stego.html

    Google Scholar 

  • Further information on steganography at www—serveers of the internet such as http://www.iquest.net/∼mrmil/stego.html and http://www.cs.hut.fi/ssh/crypto/software.html#stego

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Ross Anderson

Rights and permissions

Reprints and permissions

Copyright information

© 1996 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Franz, E., Jerichow, A., Möller, S., Pfitzmann, A., Stierand, I. (1996). Computer based steganography: How it works and why therefore any restrictions on cryptography are nonsense, at best. In: Anderson, R. (eds) Information Hiding. IH 1996. Lecture Notes in Computer Science, vol 1174. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-61996-8_28

Download citation

  • DOI: https://doi.org/10.1007/3-540-61996-8_28

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-61996-3

  • Online ISBN: 978-3-540-49589-5

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics