On the limits of steganography Anderson, R.J.; Petitcolas, F.A.P. Selected Areas in Communications, IEEE Journal on, Vol.16, Iss.4, May 1998 Pages:474-481 URL: http://80-ieeexplore.ieee.org.ezproxy.auckland.ac.nz/iel4/49/14639/00668971.pdf?isNumber=14639&prod=STD&arnumber=668971&arNumber=668971&arSt=474&ared=481&arAuthor=Anderson%2C+R.J.%3B+Petitcolas%2C+F.A.P. On the limits of steganography Anderson, R.J. Petitcolas, F.A.P. Comput. Lab., Cambridge Univ.; This paper appears in: Selected Areas in Communications, IEEE Journal on Publication Date: May 1998 Volume: 16, Issue: 4 On page(s): 474-481 ISSN: 0733-8716 References Cited: 53 CODEN: ISACEM INSPEC Accession Number: 5914461 Digital Object Identifier: 10.1109/49.668971 Current Version Published: 2002-08-06 Abstract In this paper, we clarify what steganography is and what it can do. We contrast it with the related disciplines of cryptography and traffic security, present a unified terminology agreed at the first international workshop on the subject, and outline a number of approaches-many of them developed to hide encrypted copyright marks or serial numbers in digital audio or video. We then present a number of attacks, some new, on such information hiding schemes. This leads to a discussion of the formidable obstacles that lie in the way of a general theory of information hiding systems (in the sense that Shannon gave us a general theory of secrecy systems). However, theoretical considerations lead to ideas of practical value, such as the use of parity checks to amplify covertness and provide public key steganography. Finally, we show that public key information hiding systems exist, and are not necessarily constrained to the case where the warden is passive