1996-03-05 - Re: art-stego

Header Data

From: JonWienke@aol.com
To: cypherpunks@toad.com
Message Hash: 1bc6fbb538140e7e0877b47c83d63ccc304bb0ac7d8ec21f14281b7546d573a8
Message ID: <960305022451438384532@emout05.mail.aol.com>
Reply To: _N/A

UTC Datetime: 1996-03-05 08:21:53 UTC
Raw Date: Tue, 5 Mar 1996 16:21:53 +0800

Raw message

From: JonWienke@aol.com
Date: Tue, 5 Mar 1996 16:21:53 +0800
To: cypherpunks@toad.com
Subject: Re: art-stego
Message-ID: <960305022451_438384532@emout05.mail.aol.com>
MIME-Version: 1.0
Content-Type: text/plain


.WAV files are potentially a good place to store stego information.  With a
16-bit file, as many as 8 of the least significant bits in each sample can be
replaced with encrypted info without making the file sound too wierd
(depending on the natural background noise of the recording).  If you make
one of those "waves on the beach" relaxation things, you might be able to get
away with even more.

Another thing--just a wild idea--test the randomness of encrypted data by
storing it in an 8-bit mono .WAV (your choice of sample rates) file and
listening to it.  Any correlations or patterns in the data should show up in
the playback as hums, clicks, squeals, or something.  It may even be possible
to determine the algorithm by the sound patterns--a sort of "audio
cryptanalysis."  Has anyone tried this?  Are there any .WAV stego programs
out there?

Jonathan Wienke





Thread