[533] in Cypherpunks

home help back first fref pref prev next nref lref last post

Re: Steganography and Steganalysis

daemon@ATHENA.MIT.EDU (ghoast@gnu.ai.mit.edu)
Mon May 24 17:22:50 1993

From: ghoast@gnu.ai.mit.edu
To: kqb@whscad1.att.com
Date: Mon, 24 May 1993 16:55:26 -0500 (EDT)
Cc: cypherpunks@toad.com
In-Reply-To: <9305241859.AA11273@toad.com> from "kqb@whscad1.att.com" at May 24, 93 02:37:00 pm

	What about reverse 'stealthography' where instead of first creating
your message, then attempting to create some larger ody of text in which to
hide the message, one would first generate the message to be hidden, then 
take an existing body of text (something large enough, like Shakespear's
MacBeth) and then attempt to find some concise algorithm by which the
recieving end would extract the message?

-Devin

----
ghoast@gnu.ai.mit.edu
		 ----

home help back first fref pref prev next nref lref last post