The method of claim 1 in which the data object is distributable over a computer network that has network sites with discrete addresses, the data object further including an icon presentable to a user at one of the network sites in audio or visual form, the icon being indicative of the presence of steganographically embedded address information.