Thursday, March 08, 2007

S-Tools

Author: Andy Brown
Ver. 1.0 (1994), Ver. 2.0 (1994), Ver. 3.0 (1995), Ver. 4.0 (1996)

最早接觸到 S-Tools 這個隱藏軟體是從 Neil F. Johnson 1998 February 發表在 IEEE Computer 的文章 "Steganography: Seeing the Unseen", 文章中所使用的例子是將 CORONA 偵查衛星於1966/08/20 所拍攝的前蘇聯哈薩克戰略轟炸機基地空照圖 (Soviet strategic bomber base) 隱藏到印象派大師 Pierre-Auguste Renoir (1841-1919) 的畫作 Le Moulin de la Galette (1876) 之中, 讓我印象深刻。

Sunday, March 04, 2007

Book: INFORMATION HIDING techniques for steganography and digital watermarking

From StegoRN

Editors: Stefan Katzenbeisser & Fabien A. P. Petitcolas
ARTECH HOUSE, Computer Security Series
ISBN 1-58053-035-4
(Available on Amazon.com)

This book surveys recent research results in the fields of watermarking and steganography, two disciplines generally referred to as information hiding. Included are chapters about the following topics:

* Chapter 1: Introduction to information hiding
(Fabien A. P. Petitcolas) gives an introduction to the field of information hiding, thereby discussing the history of steganography and watermarking and possible applications to modern communication systems.
* Chapter 2: Principles of steganography
(Stefan Katzenbeisser) introduces a model for steganographic communication (the ‘prisoners problem") and discusses various steganographic protocols (such as pure steganography, secret key steganography, public key steganography and supraliminal channels).
* Chapter 3: A survey of steganographic techniques
(Neil F. Johnson and Stefan Katzenbeisser) discusses several information hiding methods useable for steganographic communication, among them substitution systems, hiding methods in two-colour images, transform domain techniques, statistical steganography, distortion and cover generation techniques.
* Chapter 4: Steganalysis
(Neil F. Johnson) introduces the concepts of steganalysis – the task of detecting and possibly removing steganographic information. Included is also an analysis of common steganographic tools.
* Chapter 5: Introduction to watermarking techniques
(Martin Kutter and Frank Hartung) introduces the requirements and design issues for watermarking software. The authors also present possible applications for watermarks and discuss methods for evaluating watermarking systems.
* Chapter 6: A survey of current watermarking techniques
(Jean-Luc Dugelay and Stéphane Roche) presents several design principles for watermarking systems, among them the choice of host locations, psychovisual aspects, the choice of a workspace (DFT, DCT, wavelet), the format of the watermark bits (spread spectrum, low-frequency watermark design), the watermark insertion operator and optimizations of the watermark receiver.
* Chapter 7: Robustness of copyright marking systems
(Scott Craver, Adrian Perrig and Fabien A. P. Petitcolas) discusses the crucial issue of watermark robustness to intentional attacks. The chapter includes a taxonomy of possible attacks against watermarking systems, among them protocol attacks like inversion, oracle attacks, limitations of WWW spiders and system architecture issues.
* Chapter 8: Fingerprinting
(Jong-Hyeon Lee) discusses principles and applications of fingerprinting to the traitor tracing problem, among them statistical fingerprinting, asymmetric fingerprinting and anonymous fingerprinting.
* Chapter 9: Copyright on the Internet and watermarking
(Stanley Lai and Fabrizio Marongiu Buonaiuti) finally discusses watermarking systems from a legal point of view and addresses various other aspects of copyright law on the Internet.