[653] in Cypherpunks

home help back first fref pref prev next nref lref last post

Steganography

daemon@ATHENA.MIT.EDU (Kragen Sittler)
Thu May 27 23:56:15 1993

Date:    Thu, 27 May 1993 21:36:41 -0600 (MDT)
From: TO1SITTLER@APSICC.APS.EDU (Kragen Sittler)
To: cypherpunks-real@toad.com
X-Vmsmail-To: SMTP%"cypherpunks-real@toad.com"

I headed to the library to check out what they had, crypto-wise.  I found one
book copyright 1939, which had a chapter on methods of steganography.

Some of the suggestions I got from it:
	-Use every third letter of each word.
	-Use every nth letter of each word, where n varies depending on a key.
(e.g., 2-4-1-5-5-3)
	-use every nth word of a sentence.
	-encode in base-3 before steganizing.
	-use the number of syllables in a word.
	-use the number of words in a sentence.
Irrelevant suggestions:
	-use different fonts.
(within the same word.)
	-use broken and whole pickets in a fence.
	-use empty and full positions in a cartridge-belt, as in machine gun.
	-use invisible ink instead, it's easier. :-)

	Maybe these will help those more able to program than myself.

Kragen.

home help back first fref pref prev next nref lref last post