Dies ist eine Übersichtsseite mit Metadaten zu dieser wissenschaftlichen Arbeit. Der vollständige Artikel ist beim Verlag verfügbar.
Information hiding-a survey
2.526
Zitationen
3
Autoren
1999
Jahr
Abstract
Information-hiding techniques have recently become important in a number of application areas. Digital audio, video, and pictures are increasingly furnished with distinguishing but imperceptible marks, which may contain a hidden copyright notice or serial number or even help to prevent unauthorized copying directly. Military communications systems make increasing use of traffic security techniques which, rather than merely concealing the content of a message using encryption, seek to conceal its sender, its receiver, or its very existence. Similar techniques are used in some mobile phone systems and schemes proposed for digital elections. Criminals try to use whatever traffic security properties are provided intentionally or otherwise in the available communications systems, and police forces try to restrict their use. However, many of the techniques proposed in this young and rapidly evolving field can trace their history back to antiquity, and many of them are surprisingly easy to circumvent. In this article, we try to give an overview of the field, of what we know, what works, what does not, and what are the interesting topics for research.
Ähnliche Arbeiten
Secure spread spectrum watermarking for multimedia
1997 · 5.258 Zit.
Reversible data embedding using a difference expansion
2003 · 2.962 Zit.
Slime mould algorithm: A new method for stochastic optimization
2020 · 2.863 Zit.
Techniques for data hiding
1996 · 2.767 Zit.
Reversible data hiding
2006 · 2.605 Zit.