1993-05-24 - Re: Steganography and Steganalysis

Header Data

From: ghoast@gnu.ai.mit.edu
To: kqb@whscad1.att.com
Message Hash: 63fbb868265147af52c8d7bcde656806f4399538fe07e6cf970172bf05b5cf09
Message ID: <9305242055.AA69775@hal.gnu.ai.mit.edu>
Reply To: <9305241859.AA11273@toad.com>
UTC Datetime: 1993-05-24 20:55:50 UTC
Raw Date: Mon, 24 May 93 13:55:50 PDT

Raw message

From: ghoast@gnu.ai.mit.edu
Date: Mon, 24 May 93 13:55:50 PDT
To: kqb@whscad1.att.com
Subject: Re: Steganography and Steganalysis
In-Reply-To: <9305241859.AA11273@toad.com>
Message-ID: <9305242055.AA69775@hal.gnu.ai.mit.edu>
MIME-Version: 1.0
Content-Type: text/plain


	What about reverse 'stealthography' where instead of first creating
your message, then attempting to create some larger ody of text in which to
hide the message, one would first generate the message to be hidden, then 
take an existing body of text (something large enough, like Shakespear's
MacBeth) and then attempt to find some concise algorithm by which the
recieving end would extract the message?

-Devin

----
ghoast@gnu.ai.mit.edu
		 ----




Thread