Re: The problem with Steganography

2000-01-28 Thread William Allen Simpson
Catching up on the thread, the comments about fitting the stego into the image reminded me of http://www.outguess.org/ by Niels Provos. Looks like he's a few months ahead of you Marc Horowitz wrote: Rick Smith [EMAIL PROTECTED] writes: Thus, a 'good' stego system must use a crypto

Re: The problem with Steganography

2000-01-27 Thread Russell Nelson
Ben Laurie writes: If you want a lot of people to see it, you can't keep it secret. If you can't keep it secret, you may as well just come out with it and publish the bits without stego. What did I miss? It depends on how hostile the regime is. If you want to publish something but

Re: The problem with Steganography

2000-01-27 Thread Arnold G. Reinhold
At 1:34 AM -0500 1/26/2000, Marc Horowitz wrote: Rick Smith [EMAIL PROTECTED] writes: The basic notion of stego is that one replaces 'noise' in a document with the stego'ed information. Thus, a 'good' stego system must use a crypto strategy whose statistical properties mimic the noise

Re: The problem with Steganography

2000-01-27 Thread Steve Reid
On Tue, Jan 25, 2000 at 04:51:12PM -0800, Nelson Minar wrote: Of course, this isn't easy to do - "matching statistical properties" isn't a simple closed problem. But I bet you could do fairly well in certain circumstances. For instance, Linux uses a strong random number when starting a TCP

Re: The problem with Steganography

2000-01-27 Thread Steven M. Bellovin
In message [EMAIL PROTECTED], Marc Horowitz writes: In short, is steganography the ultimate surveillance tool? Like most surveillance technologies, this is a game of constant incremental improvements. You watch me through a window, I put up curtains. You listen through a hidden

Re: The problem with Steganography

2000-01-27 Thread j
question becomes, without identifying the location of the ciphertext in a prior agreement or on some outside channel, can a person communicate with friends without alerting enemies to the existance of secret communications? In this case you are entering the realm of psychology. There may be a

Re: The problem with Steganography

2000-01-27 Thread Rick Smith
At 12:12 AM 01/27/2000 +, Ben Laurie wrote: I can't quite see the point of forward stego. I'll leave it to Russ to explain his application if he wants to. Why not publish something public key encrypted and publish the private key later? Symmetric cryptography has two advantages in this

Re: The problem with Steganography

2000-01-26 Thread Nelson Minar
I wonder if stego users will have to choose between uncrackable encryption or undetectable data. I don't think so. Replacing the low-order bits of a picture with random noise (or an encrypted message) is silly - like you say, anyone can find it easily. But there is a certain amount of free

Re: The problem with Steganography

2000-01-26 Thread lcs Mixmaster Remailer
The basic notion of stego is that one replaces 'noise' in a document with the stego'ed information. Thus, a 'good' stego system must use a crypto strategy whose statistical properties mimic the noise properties of the carrying document. Our favorite off the shelf crypto algorithms do *not*

Re: The problem with Steganography

2000-01-26 Thread Russell Nelson
David Honig writes: At 03:20 PM 1/25/00 -0500, Russell Nelson wrote: I'm trying to do forward stego -- that is, publish some encrypted steganographic document, with the idea that, once everyone has a copy, *then* you reveal the key. Fascinating, captain. Canna imagine why.

Re: The problem with Steganography

2000-01-26 Thread P.J. Ponder
On Tue, 25 Jan 2000, Rick Smith wrote: . . . . For example, many stego implementations involve embedding data in the low order bits of a graphical image. Those low order bits undoubtedly have some measurably non-random statistical properties. Once we replace those bits with data, the bits

Re: The problem with Steganography

2000-01-26 Thread Dan Geer
If the picture was taken by an actual camera, the least significant bits will be random due to the nature of the way CCDs work in the real world. They might be biased, but it's not very hard to bias a "random" data stream. You could have the sender look at the bias in the

Re: The problem with Steganography

2000-01-26 Thread Eric Tully
Forgive me if I'm missing the point here but I don't think the original question was how to make steganography better and hide the message more effectively (although that's certainly a valuable goal). Sometimes it's important to hide the fact that a secret message exists. A good guy in enemy

Re: The problem with Steganography

2000-01-26 Thread Ben Laurie
Rick Smith wrote: It sounds like there are a number of interesting design questions. For example, the sender and recipient must obviously share a secret key. Why is that obvious? What's wrong with encoding with the recipient's public key? Cheers, Ben. -- SECURE HOSTING AT THE BUNKER!

Re: The problem with Steganography

2000-01-26 Thread Ben Laurie
Rick Smith wrote: Rick Smith wrote: It sounds like there are a number of interesting design questions. For example, the sender and recipient must obviously share a secret key. At 10:18 PM 01/26/2000 +, Ben Laurie wrote: Why is that obvious? What's wrong with encoding with the

Re: The problem with Steganography

2000-01-26 Thread lcs Mixmaster Remailer
For example, it's possible that this email was written by a political prisoner in a 3rd world country and he's used steganography to conceal a message to his friends and family right here in these 3 paragraphs. My question is, without prior agreement or access to an outside channel, how are

Re: The problem with Steganography

2000-01-25 Thread lcs Mixmaster Remailer
The problem with Steganography is that there's basically no way to clue people in to it's location without clueing everyone into it. That's not a problem. By definition, successful steganography is undetectable even when you know where to look. Otherwise the steaganography has failed

Re: The problem with Steganography

2000-01-25 Thread P.J. Ponder
' is not with steganography, but with trying to apply it outside of a security model that permits it. On 25 Jan 2000, lcs Mixmaster Remailer wrote: The problem with Steganography is that there's basically no way to clue people in to it's location without clueing everyone into it. That's not a problem

Re: The problem with Steganography

2000-01-25 Thread Russell Nelson
lcs Mixmaster Remailer writes: The problem with Steganography is that there's basically no way to clue people in to it's location without clueing everyone into it. Encryption is successful if the attacker can't find information about the plaintext without the key. Ideally, he can't

Re: The problem with Steganography

2000-01-25 Thread David Honig
At 03:20 PM 1/25/00 -0500, Russell Nelson wrote: I'm trying to do forward stego -- that is, publish some encrypted steganographic document, with the idea that, once everyone has a copy, *then* you reveal the key. Fascinating, captain. Canna imagine why. Problem is, how do you convince them

Re: The problem with Steganography

2000-01-25 Thread Rick Smith
At 07:20 PM 01/25/2000 -, lcs Mixmaster Remailer wrote: Steganography is successful if the attacker can't distinguish message-holding data from ordinary data without the key. Ideally, he can't guess whether a message is present any better upon inspecting the cover data than he could without