SLIDE 1
2
Introducing Hiding
- Two strategies to safeguard assets:
protect (guards, walls, safes, hardcore crypto)
✁hide (dig, evade, useful when out gunned)
- Fields in information hiding:
Anonymity, traffic analysis, steganography, steganalysis, low probability of intercept, watermarking, computer forensics, censorship resistance.
- Anonymity: hiding links between actions and