CITATION:
Neil F. Johnson. Steganography. Technical Report. November 1995.
This original paper was placed on the web in 1996. An updated was published in IEEE Computer in 1998.
TABLE 1: KAHN'S SECURITY CATEGORIES FIGURE 1: GRAY-SCALE PALETTE FIGURE 2: RENOIR PALETTE FIGURE 3: NEBULA PALETTE FIGURE 4: LONG-RANGE AVIATION AIRFIELD FIGURE 5: RENOIR'S LE MOULIN DE LA GALETTE - CONTAINER C1 FIGURE 6: DROESHOUT ENGRAVING OF WILLIAM SHAKESPEARE - CONTAINER C2 FIGURE 7: RESULT OF USING HIDE AND SEEK FOR EMBEDDING M1 INTO C2 FIGURE 8: RESULT OF EMBEDDING M1 IN C2 WITH STEGODOS FIGURE 9: RESULT OF EMBEDDING M1 IN C2 USING WHITE NOISE STORM FIGURE 10: C1 EMBEDDED WITH M2 (AIRFIELD) USING WHITE NOISE STORM FIGURE 11: LEFT IS THE ORIGINAL C2. RIGHT IS C2 WITH M1 EMBEDDED WITH S-TOOLS FIGURE 12: RESULT OF EMBEDDING M2 IN C1 WITH S-TOOLS