1998-05-26 - Cite for “… [Spooks] Digital Steganography”

Header Data

From: Xcott Craver <caj@math.niu.edu>
To: cypherpunks@toad.com
Message Hash: 53463be3eb5ab62441c7ea161143c6daf86ab48f2b10d215c1b47fa3af430089
Message ID: <Pine.SUN.3.91.980525202932.10331A-100000@baker>
Reply To: <19980525142146.B3293@die.com>
UTC Datetime: 1998-05-26 01:54:38 UTC
Raw Date: Mon, 25 May 1998 18:54:38 -0700 (PDT)

Raw message

From: Xcott Craver <caj@math.niu.edu>
Date: Mon, 25 May 1998 18:54:38 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Cite for "... [Spooks] Digital Steganography"
In-Reply-To: <19980525142146.B3293@die.com>
Message-ID: <Pine.SUN.3.91.980525202932.10331A-100000@baker>
MIME-Version: 1.0
Content-Type: text/plain

On Mon, 25 May 1998, Dave Emery wrote:

=> ----- Forwarded message from Bob Margolis <rttyman@wwa.com> -----

	Hi, all.

=>    "As a method to provide secure communications on the battlefield, we
=>    are pursuing research in the area of digital steganography," says
=>    Lisa Marvel, an electronics engineer at ARL's Information Science &
=>    Technology Directorate.

	Lisa Marvel presented the paper, "Reliable Blind Information
Hiding for Images" at the last Info Hiding Workshop (2nd annual) in April.
Coauthored with C. Boncelet, Jr. (U. Delaware) and C. Retter (Also 
from US ARM), the paper describes spread-spectrum techniques for hiding 
a good 1-5 Kilobytes in a 512x512 greyscale image securely and w/ error 

	The proceedings aren't out yet, but one of the conference-goers
was kind enough to put electronic versions of the papers online.  See:


	The ARM paper is in session 1.


 ,oooooooo8     o     ooooo@math.niu.edu  ---  http://www.math.niu.edu/~caj/
o888'   `88   ,888.    888  
888          ,8'`88.   888   "I have discovered a truly marvelous proof of
888o.   ,oo ,8oooo88.  888  this statement, which, unfortunately, this margin
`888oooo88 o88o  o888o 888  is too small to contain.  And my FUCKING word 
____________________8o888'__processor won't let me resize it."_______________