[6532] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: The problem with Steganography

daemon@ATHENA.MIT.EDU (William Allen Simpson)
Fri Jan 28 15:42:58 2000

Message-ID: <3890F684.7174CA76@greendragon.com>
Date: Thu, 27 Jan 2000 20:53:58 -0500
From: William Allen Simpson <wsimpson@greendragon.com>
MIME-Version: 1.0
To: Marc Horowitz <marc@mit.edu>
Cc: Rick Smith <rick_smith@securecomputing.com>, cryptography@c2.net
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit

Catching up on the thread, the comments about fitting the stego into the 
image reminded me of http://www.outguess.org/ by Niels Provos.  Looks like 
he's a few months ahead of you....

Marc Horowitz wrote:
> 
> Rick Smith <rick_smith@securecomputing.com> writes:
> 
> >> Thus, a 'good' stego system must use a crypto
> >> strategy whose statistical properties mimic the noise properties of the
> >> carrying document. ... So, can't we detect the presence of stego'ed data by
> >> looking for 'noise' in the document that's *too* random?
> >>
> >> ... Once we replace those bits
> >> with data, the bits will have serously random statistical properties. So,
> >> we can detect stego'ed data if the implementation uses any well known
> >> strong encryption algorithm.
> 
> If the picture was taken by an actual camera, the least significant
> bits will be random due to the nature of the way CCDs work in the real
> world.  They might be biased, but it's not very hard to bias a
> "random" data stream.  

WSimpson@UMich.edu
    Key fingerprint =  17 40 5E 67 15 6F 31 26  DD 0D B9 9B 6A 15 2C 32


home help back first fref pref prev next nref lref last post