Steganography Two stage process Determine "redundant" bits Select which of these bits to embed the encrypted message (determined by PRG, initialized with seed) Set state based on initial seed, embed a secondary seed that selects a PRG that makes minimal modifications Defend against statistical attacks that look at distribution of DCT coefficients, etc.