From: John Young <jya@pipeline.com>
To: cypherpunks@toad.com
Message Hash: 37696b8dc0848d596f6c53317bbf283d6ed2a5d974fc575f297c9f05fca0f3f2
Message ID: <199408031555.LAA08226@pipe2.pipeline.com>
Reply To: N/A
UTC Datetime: 1994-08-03 15:56:59 UTC
Raw Date: Wed, 3 Aug 94 08:56:59 PDT
From: John Young <jya@pipeline.com>
Date: Wed, 3 Aug 94 08:56:59 PDT
To: cypherpunks@toad.com
Subject: Steganography by CAD
Message-ID: <199408031555.LAA08226@pipe2.pipeline.com>
MIME-Version: 1.0
Content-Type: text/plain
Responding to msg by a.brown@nexor.co.uk (Andrew Brown) on Wed,
3 Aug 1:17 PM
Andy:
Features for concealment of plain or cyphertext by CAD
programs:
1. Plain or cyphertext can be imported by each letter, by
sentence, by block of text; then manipulated by the CAD program
as one or multiple concealed CAD entities.
2. Text manipulation includes:
Reduce to any scale.
Place on hidden layers.
Hide by other entities.
Distort to a variety of shapes.
And otherwise disfigure the text into non-recognizable
forms.
3. In addition, there are a host of CAD-features for further,
multiple, transformations of the text, including algorithmic
permutations.
4. Subsequent manipulation of the CAD document may include
exporting to other proprietary and generic CAD formats.
5. CAD document may then be transmitted plain (in the selected
CAD format) or encrypted for transmission.
6. The recipient uses a CAD program (and decryption program if
needed) to restore the concealed text to its original encrypted
form. It is exported to the original encryption program for
decryption.
7. Caveat 1: While this manipulation will be invisible or
camouflaged in the CAD document the underlying code of the
program will provide clues. However, it should be possible to
encrypt these clues.
8. Caveat 2: Sender and recipient will need to exchange
protocols, by encrypted transmission probably, for restoring
the concealed text.
9. Caveat 3: This is not elegant and requires little or no
crypto competency. But it can be easily done by a CAD operator
to help conceal sophisticated crypto.
Comments?
John, an architect of the building codes domain.
Return to August 1994
Return to “John Young <jya@pipeline.com>”
1994-08-03 (Wed, 3 Aug 94 08:56:59 PDT) - Steganography by CAD - John Young <jya@pipeline.com>