[533] in Cypherpunks
Re: Steganography and Steganalysis
daemon@ATHENA.MIT.EDU (ghoast@gnu.ai.mit.edu)
Mon May 24 17:22:50 1993
From: ghoast@gnu.ai.mit.edu
To: kqb@whscad1.att.com
Date: Mon, 24 May 1993 16:55:26 -0500 (EDT)
Cc: cypherpunks@toad.com
In-Reply-To: <9305241859.AA11273@toad.com> from "kqb@whscad1.att.com" at May 24, 93 02:37:00 pm
What about reverse 'stealthography' where instead of first creating
your message, then attempting to create some larger ody of text in which to
hide the message, one would first generate the message to be hidden, then
take an existing body of text (something large enough, like Shakespear's
MacBeth) and then attempt to find some concise algorithm by which the
recieving end would extract the message?
-Devin
----
ghoast@gnu.ai.mit.edu
----