Attacks on Steganographic Systems
IH '99 Proceedings of the Third International Workshop on Information Hiding
An Implementation of Key-Based Digital Signal Steganography
IHW '01 Proceedings of the 4th International Workshop on Information Hiding
IHW '01 Proceedings of the 4th International Workshop on Information Hiding
Steganalysis of JPEG Images: Breaking the F5 Algorithm
IH '02 Revised Papers from the 5th International Workshop on Information Hiding
Perturbed quantization steganography with wet paper codes
Proceedings of the 2004 workshop on Multimedia and security
Reliable detection of LSB steganography in color and grayscale images
MM&Sec '01 Proceedings of the 2001 workshop on Multimedia and security: new challenges
Defending against statistical steganalysis
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
Asymptotically optimal perfect steganographic systems
Problems of Information Transmission
Fisher Information Determines Capacity of ε-Secure Steganography
Information Hiding
Steganography in Digital Media: Principles, Algorithms, and Applications
Steganography in Digital Media: Principles, Algorithms, and Applications
Steganalysis by subtractive pixel adjacency matrix
IEEE Transactions on Information Forensics and Security
A general framework for structural steganalysis of LSB replacement
IH'05 Proceedings of the 7th international conference on Information Hiding
Perfectly Secure Steganography: Capacity, Error Exponents, and Code Constructions
IEEE Transactions on Information Theory
On the limits of steganography
IEEE Journal on Selected Areas in Communications
Hi-index | 0.00 |
Censorship of communications is a widespread and current practice in various countries with repressive governments in order to prevent or restrict speech; political speech in particular. In many cases state-run telecommunications agencies, including those providing Internet and phone service, actively filter content or disconnect users in defense of incumbents in the face of widespread criticism by citizens. In this paper I present the results of experiments with Blacknoise, a system that uses commodity low-cost mobile telephones equipped with cameras, and takes advantage of their low-fidelity, noisy sensors in order to enable embedding of arbitrary text payloads into the images they produce. These images can then be disseminated via MMS, Bluetooth, or posting on the Internet, without requiring a separate digital camera or computer to perform processing.