5. Conclusion
This introduction to steganography shows the variety of techniques used. It is clear that the origin of this variety is twofold: on the one hand, it is linked to the types of data, and on the other, to the representation formats adopted. As the latter frequently evolve, so do the techniques, and their number continues to grow. As a result, we have only presented a limited corpus of techniques, albeit fairly representative of the digital domain.
One definition of steganographic system security is based on the probability distribution of the original documents and the documents obtained after concealment: the system is secure if these distributions are indistinguishable. This security model makes it possible to construct theoretical systems with perfect security. Unfortunately, these systems have no practical use. On the other hand, a major problem with this model...
Exclusive to subscribers. 97% yet to be discovered!
Already subscribed? Log in!
Conclusion
Article included in this offer
"Security of information systems"
(
86 articles
)
Updated and enriched with articles validated by our scientific committees
A set of exclusive tools to complement the resources
Bibliography
Exclusive to subscribers. 97% yet to be discovered!
Already subscribed? Log in!