1994-02-25 - Re: WE WANT SELF DECRYPTING STENOGRAPHY NOW!

Header Data

From: Sergey Goldgaber <sergey@delbruck.pharm.sunysb.edu>
To: Tom Holroyd <tomh@bambi.ccs.fau.edu>
Message Hash: e942b8ec6608d43ea026ad255f0b667d218eed2b09e9ddeb5adf6310e4e62ee7
Message ID: <Pine.3.89.9402251245.E1961-0100000@delbruck.pharm.sunysb.edu>
Reply To: <9402250339.AA14924@bambi.ccs.fau.edu>
UTC Datetime: 1994-02-25 18:02:44 UTC
Raw Date: Fri, 25 Feb 94 10:02:44 PST

Raw message

From: Sergey Goldgaber <sergey@delbruck.pharm.sunysb.edu>
Date: Fri, 25 Feb 94 10:02:44 PST
To: Tom Holroyd <tomh@bambi.ccs.fau.edu>
Subject: Re: WE WANT SELF DECRYPTING STENOGRAPHY NOW!
In-Reply-To: <9402250339.AA14924@bambi.ccs.fau.edu>
Message-ID: <Pine.3.89.9402251245.E1961-0100000@delbruck.pharm.sunysb.edu>
MIME-Version: 1.0
Content-Type: text/plain




On Thu, 24 Feb 1994, Tom Holroyd wrote:

> Any software for hiding data in fractals would have the problem that
> people would eventually learn to recognize the type of fractal.  Thus
> when the FBI digs through your PC, they'd find the fractals, and recognize
> them as data carriers.	Hiding data in arbitrary .jpg files would solve
> this problem, but even so, if the FBI knows there is software for
> hiding data in the low bits of .jpg files, they'd run it on all your
> pictures as a matter of course.  Naturally you'll have encrypted your
> file, but you may as well have left it on the disk as is.
> 

If you hide your files in different locations in the image every time, your
opponent will have no way of knowing which location you've chosen.  And, 
if the file has no tell-tale headers, than this method provides adequate 
security.  Mere fractal images are evidence of nothing.


Sergey







Thread