From: ghoast@gnu.ai.mit.edu
To: kqb@whscad1.att.com
Message Hash: 63fbb868265147af52c8d7bcde656806f4399538fe07e6cf970172bf05b5cf09
Message ID: <9305242055.AA69775@hal.gnu.ai.mit.edu>
Reply To: <9305241859.AA11273@toad.com>
UTC Datetime: 1993-05-24 20:55:50 UTC
Raw Date: Mon, 24 May 93 13:55:50 PDT
From: ghoast@gnu.ai.mit.edu
Date: Mon, 24 May 93 13:55:50 PDT
To: kqb@whscad1.att.com
Subject: Re: Steganography and Steganalysis
In-Reply-To: <9305241859.AA11273@toad.com>
Message-ID: <9305242055.AA69775@hal.gnu.ai.mit.edu>
MIME-Version: 1.0
Content-Type: text/plain
What about reverse 'stealthography' where instead of first creating
your message, then attempting to create some larger ody of text in which to
hide the message, one would first generate the message to be hidden, then
take an existing body of text (something large enough, like Shakespear's
MacBeth) and then attempt to find some concise algorithm by which the
recieving end would extract the message?
-Devin
----
ghoast@gnu.ai.mit.edu
----
Return to May 1993
Return to ““Perry E. Metzger” <pmetzger@lehman.com>”