Conclusion
An introduction to Steganography
Article REF: H5870 V2
Conclusion
An introduction to Steganography

Author : Fabien GALAND

Publication date: February 10, 2015 | Lire en français

Logo Techniques de l'Ingenieur You do not have access to this resource.
Request your free trial access! Free trial

Already subscribed?

5. Conclusion

This introduction to steganography shows the variety of techniques used. It is clear that the origin of this variety is twofold: on the one hand, it is linked to the types of data, and on the other, to the representation formats adopted. As the latter frequently evolve, so do the techniques, and their number continues to grow. As a result, we have only presented a limited corpus of techniques, albeit fairly representative of the digital domain.

One definition of steganographic system security is based on the probability distribution of the original documents and the documents obtained after concealment: the system is secure if these distributions are indistinguishable. This security model makes it possible to construct theoretical systems with perfect security. Unfortunately, these systems have no practical use. On the other hand, a major problem with this model...

You do not have access to this resource.
Logo Techniques de l'Ingenieur

Exclusive to subscribers. 97% yet to be discovered!

You do not have access to this resource. Click here to request your free trial access!

Already subscribed?


Article included in this offer

"Security of information systems"

( 86 articles )

Complete knowledge base

Updated and enriched with articles validated by our scientific committees

Services

A set of exclusive tools to complement the resources

View offer details