The goal of this task is a reference implementation of public key steganography, and we think that such an implementation yields to important insights about the practical usability of the scheme.
We will evaluate the eligibility of public key schemes, such as RSA, DH, and the promising ECC (elliptic curve cryptography) for the application in a steganographic context.
In brief:
We will design a reference implementation of public key steganography.