Computer Based Steganography: How It Works and Why Therefore Any Restrictions on Cryptography Are Nonsense, at Best

@inproceedings{Franz1996ComputerBS,
  title={Computer Based Steganography: How It Works and Why Therefore Any Restrictions on Cryptography Are Nonsense, at Best},
  author={Elke Franz and Anja Jerichow and Steffen M{\"o}ller and Andreas Pfitzmann and Ingo Stierand},
  booktitle={Information Hiding},
  year={1996}
}
In the future, messages, e.g. speech, text or pictures, will be transmitted digitally since this is cheaper, more perfect and more flexible. It is possible to hide messages, which are of necessity much shorter, nearly unrecognizable for outsiders in such digitized messages. In this article we describe how computer based steganography works and give a summary on the results of our implementation. 
Highly Cited
This paper has 63 citations. REVIEW CITATIONS

From This Paper

Figures, tables, and topics from this paper.
37 Citations
0 References
Similar Papers

Citations

Publications citing this paper.

63 Citations

05'97'02'08'14
Citations per Year
Semantic Scholar estimates that this publication has 63 citations based on the available data.

See our FAQ for additional information.

Similar Papers

Loading similar papers…