“Good” Applications
- Digital “Watermarking”
Identification of Source of Material
Establish Ownership
Often Identify Licensee
- Copy Protection Schemes
Reduce Software Piracy
Enhance Prosecution Efforts
- Only Works Against “The Masses”
- The Professionals Have Broken All Systems to Date
- The Professionals Will Break All Systems in the Future
Introduction to Steganography