FINDING · DEFENSE

The paper demonstrates that no single steganographic algorithm can provide both availability and deniability, since almost all production algorithms have been broken and steganography alone does not hide the identities of communicating parties. Collage addresses this by treating the embedding algorithm as a swappable component in a layered architecture—vector layer, message layer, application layer—so that compromise of the embedding scheme does not compromise the system, and stronger algorithms (e.g., digital watermarking) can be substituted as they mature.

From 2010-burnett-chippingChipping Away at Censorship Firewalls with User-Generated Content · §4.1, §2 · 2010 · USENIX Security Symposium

Implications

Tags

censors
generic
techniques
dpitraffic-shape
defenses
steganographymeta-resistance

Extracted by claude-sonnet-4-6 — review before relying.