|
|
|
Steklov Institute St. Petersburg
|
Technische Universität München
|
State University St. Petersburg
|
Joint Advanced Student School (JASS)
Course 1: Algorithms in IT Security
St. Petersburg - Wednesday, March 30 through Saturday, April 9, 2005
Nikolay Soldatov
Information Hiding
Abstract
Recently, in some of US newspapers appeared the
information that using spam messages is a way of
secret communications. This technique is supposed to
be used by terrorist organizations and various
military agencies, with help of steganographic
algorithms, which are the part of a young information
technology field called the information hiding. It is
mainly divided into two parts: steganography and
watermarking. Steganography is used not to encipher
the information, but to hide the occurrence of
communication in some sort of communication medium
called stego-object. The secret information is called
an embedded data. As an example we may consider images
on the Internet, spam messages etc. The watermarking
is commonly used to protect the information from
changing or to provide the possibility of author's
rights confirmation etc. The main difference is that
cover-object plays a small role in steganography case
and has a great meaning in the case of watermarking.
The interest of scientific society to this field rose
in 1996 when the first academic conference on this
subject was organized (see presentation, p. 2).
|