Copyright 2004 Ken Greenebaum
Steganography applications
n
‘Hot’ topics
n
Watermarking
n
Used by recording industry
n
Communication w/o interception
n
Used by terrorists