From: Sergey Goldgaber <sergey@delbruck.pharm.sunysb.edu>
To: Jim_Miller@bilbo.suite.com
Message Hash: 15ad646b84096f261b7b64da0f2fb364f34eab2ee793d0f0e240043ca48ae1a5
Message ID: <Pine.3.89.9403050304.H28008-0100000@delbruck.pharm.sunysb.edu>
Reply To: <9403042001.AA02468@bilbo.suite.com>
UTC Datetime: 1994-03-05 08:03:32 UTC
Raw Date: Sat, 5 Mar 94 00:03:32 PST
From: Sergey Goldgaber <sergey@delbruck.pharm.sunysb.edu>
Date: Sat, 5 Mar 94 00:03:32 PST
To: Jim_Miller@bilbo.suite.com
Subject: Re: more steganography talk
In-Reply-To: <9403042001.AA02468@bilbo.suite.com>
Message-ID: <Pine.3.89.9403050304.H28008-0100000@delbruck.pharm.sunysb.edu>
MIME-Version: 1.0
Content-Type: text/plain
On Fri, 4 Mar 1994, Jim Miller wrote:
> In my mind, the perfect steganography system depends upon either an
> environment containing ubiquitous random bit sequences or a
> reversible algorithm that can transform non-random bit sequences into
> random bit sequences without using encryption (unlikely).
Such is the function of Mimic, available at ftp.cs.cornell.edu
in /pub/wayner/Mimic
It holds the most promise for steganography, in my oppinion. Unfortunately,
it may be difficult to implement, initially.
Sergey
Return to March 1994
Return to “Sergey Goldgaber <sergey@delbruck.pharm.sunysb.edu>”