This paper investigates possibilities to develop adaptive steganographic algorithms in general and especially for images as possible cover data. We exploit <i>dithering</i> as a means to gain image information that can be used by adaptive steganographic algorithms. First, we point out general possibilities for using this process for steganography and… (More)
Privacy-Enhancing Identity Management (PIM) enables us-ers to control which personal information they provide to their communication partner(s) by partitioning their personal information into partial identities for themselves. Since partial identities must not be linkable, they cannot share a global name. Therefore, pseudonyms are used as identifiers.We… (More)
Dagmar Schönfeld und Dogan Kesdogan.