PDMI TUM State University St. Petersburg
Steklov Institute St. Petersburg Technische Universität München State University St. Petersburg

Joint Advanced Student School (JASS)

Course 1: Algorithms in IT Security

St. Petersburg - Wednesday, March 30 through Saturday, April 9, 2005

Nikolay Soldatov

Information Hiding


Recently, in some of US newspapers appeared the information that using spam messages is a way of secret communications. This technique is supposed to be used by terrorist organizations and various military agencies, with help of steganographic algorithms, which are the part of a young information technology field called the information hiding. It is mainly divided into two parts: steganography and watermarking. Steganography is used not to encipher the information, but to hide the occurrence of communication in some sort of communication medium called stego-object. The secret information is called an embedded data. As an example we may consider images on the Internet, spam messages etc. The watermarking is commonly used to protect the information from changing or to provide the possibility of author's rights confirmation etc. The main difference is that cover-object plays a small role in steganography case and has a great meaning in the case of watermarking. The interest of scientific society to this field rose in 1996 when the first academic conference on this subject was organized (see presentation, p. 2).

Information Hiding[PPT]
Information Hiding[PDF]