1994-03-05 - Re: more steganography talk

Header Data

From: Sergey Goldgaber <sergey@delbruck.pharm.sunysb.edu>
To: Jim_Miller@bilbo.suite.com
Message Hash: 15ad646b84096f261b7b64da0f2fb364f34eab2ee793d0f0e240043ca48ae1a5
Message ID: <Pine.3.89.9403050304.H28008-0100000@delbruck.pharm.sunysb.edu>
Reply To: <9403042001.AA02468@bilbo.suite.com>
UTC Datetime: 1994-03-05 08:03:32 UTC
Raw Date: Sat, 5 Mar 94 00:03:32 PST

Raw message

From: Sergey Goldgaber <sergey@delbruck.pharm.sunysb.edu>
Date: Sat, 5 Mar 94 00:03:32 PST
To: Jim_Miller@bilbo.suite.com
Subject: Re: more steganography talk
In-Reply-To: <9403042001.AA02468@bilbo.suite.com>
Message-ID: <Pine.3.89.9403050304.H28008-0100000@delbruck.pharm.sunysb.edu>
MIME-Version: 1.0
Content-Type: text/plain




On Fri, 4 Mar 1994, Jim Miller wrote:

> In my mind, the perfect steganography system depends upon either an  
> environment containing ubiquitous random bit sequences or a  
> reversible algorithm that can transform non-random bit sequences into  
> random bit sequences without using encryption (unlikely).

Such is the function of Mimic, available at ftp.cs.cornell.edu
in /pub/wayner/Mimic

It holds the most promise for steganography, in my oppinion.  Unfortunately,
it may be difficult to implement, initially.


Sergey







Thread