From: jps@monad.semcor.com (Jack P. Starrantino)
To: cypherpunks@toad.com
Message Hash: a8a7a87f217b5a74b8576c5b937e47358f6c51ad32dd8a228a71ea2072c47d96
Message ID: <9510140243.AA06608@monad.semcor.com>
Reply To: N/A
UTC Datetime: 1995-10-14 02:40:12 UTC
Raw Date: Fri, 13 Oct 95 19:40:12 PDT
From: jps@monad.semcor.com (Jack P. Starrantino)
Date: Fri, 13 Oct 95 19:40:12 PDT
To: cypherpunks@toad.com
Subject: Re: responce to graphic encryption replies
Message-ID: <9510140243.AA06608@monad.semcor.com>
MIME-Version: 1.0
Content-Type: text/plain
> ... The graphic file is going to have a highly correlated
> structure, long runs of white space etc.
This is not the case for digital imagery. For any given band, if you
sample a significant portion of the image it would not be surprising to
see a more or less random distribution over the range.
> The statistics for such a file
> would be different than the random distribution you'd get from using the
> wrong key.
If you decrypt with the wrong key, do you get a random distribution?
Would this be the case for all wrong keys? Would the statistics change
in any discernible pattern as the keys got "closer"?
> Even if the graphics format is compressed, leading to a more
> even distribution, ...
This may give a better result. Most compressions involve a shift to the
frequency domain with a quantization of the samples. You might be able
to write a detector based on this discontinuity.
You could also try throwing an edge detector or some other morphological
recognizer at the output. It would still be cheaper than having to a man
in the loop, but you're going to spend a lot of cpu time.
jps
--
Jack P. Starrantino (215) 674-0200 (voice)
SEMCOR, Inc. (215) 443-0474 (fax)
65 West Street Road jps@semcor.com
Suite C-100
Warminster, PA 18974
Return to October 1995
Return to “jps@monad.semcor.com (Jack P. Starrantino)”