[9334] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: How to ban crypto?

daemon@ATHENA.MIT.EDU (Angelos D. Keromytis)
Sun Sep 16 18:45:47 2001

Message-Id: <200109162241.f8GMfN213463@coredump.cs.columbia.edu>
To: Sam Weiler <weiler@watson.org>
Cc: cryptography@wasabisystems.com, ukcrypto@chiark.greenend.org.uk
In-reply-to: Your message of "Sun, 16 Sep 2001 18:35:52 EDT."
             <Pine.NEB.3.96L.1010916183138.40839A-100000@fledge.watson.org> 
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Date: Sun, 16 Sep 2001 18:41:23 -0400
From: "Angelos D. Keromytis" <angelos@cs.columbia.edu>


In message <Pine.NEB.3.96L.1010916183138.40839A-100000@fledge.watson.org>, Sam 
Weiler writes:
>
>That (excellent) paper was in the refereed track, not the WiPs:
>
>http://www.usenix.org/publications/library/proceedings/sec01/provos.html
>http://www.citi.umich.edu/u/provos/stego/
>http://www.outguess.org/

The above URLs point to the first paper, on statistical analysis of
steganographic content in images and on a method to bypass them (as implemented
in Outguess 0.2); there is a followup paper that talks about applying this
method for large-scale stego detection. This second paper is as yet
unpublished, and that's what I was referring to.
-Angelos





---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@wasabisystems.com

home help back first fref pref prev next nref lref last post