From: jdblair@nextsrv.cas.muohio.EDU
To: cypherpunks@toad.com (Cypherpunks Mailing List )
Message Hash: 4c725c598bde387acbc302af9df7156e7263eb84fb3200a11cad230a4515e0d3
Message ID: <9403010537.AA08539@ nextsrv.cas.muohio.EDU >
Reply To: N/A
UTC Datetime: 1994-03-01 05:39:28 UTC
Raw Date: Mon, 28 Feb 94 21:39:28 PST
From: jdblair@nextsrv.cas.muohio.EDU
Date: Mon, 28 Feb 94 21:39:28 PST
To: cypherpunks@toad.com (Cypherpunks Mailing List )
Subject: Re: standard for stefonography?
Message-ID: <9403010537.AA08539@ nextsrv.cas.muohio.EDU >
MIME-Version: 1.0
Content-Type: text/plain
Correct me if I'm wrong, but the "Standard Stego" package that has been
discussed could operate like the "stealth ocean" ideas that have been
discussed. Some sort of hash function defines "random-like" bits to be
accessed in a consecutive form. These bits can be located in a hard
drive full of digitized noise, a jpeg or gif file, a CD, or any other
large chunk of data. The access mechanism can be standardized. Without
the key string, you don't know which bits are random and which are data.
-john.
Return to March 1994
Return to “jdblair@nextsrv.cas.muohio.EDU”
1994-03-01 (Mon, 28 Feb 94 21:39:28 PST) - Re: standard for stefonography? - jdblair@nextsrv.cas.muohio.EDU