>I wonder if stego users will have to choose between uncrackable
>encryption or undetectable data.
I don't think so. Replacing the low-order bits of a picture with
random noise (or an encrypted message) is silly - like you say, anyone
can find it easily. But there is a certain amount of free entropy in a
picture. And if you create a data stream to match its statistical
properties, and you hide it there, no one's going to notice.
Of course, this isn't easy to do - "matching statistical properties"
isn't a simple closed problem. But I bet you could do fairly well in
certain circumstances. For instance, Linux uses a strong random number
when starting a TCP connections. I bet you can hide a few bits of data
in there and no one will see it.
[EMAIL PROTECTED]
. . . . . . . . http://www.media.mit.edu/~nelson/
- The problem with Steganography Russell Nelson
- Re: The problem with Steganography lcs Mixmaster Remailer
- Re: The problem with Steganography P.J. Ponder
- Re: The problem with Steganography Russell Nelson
- Re: The problem with Steganography David Honig
- Re: The problem with Steganography Russell Nelson
- Re: The problem with Steganography Rick Smith
- Re: The problem with Steganography Nelson Minar
- Re: The problem with Steganography Steve Reid
- Re: The problem with Steganography Bill Stewart
- Re: The problem with Steganography Marc Horowitz
- Re: The problem with Steganography Dan Geer
- Re: The problem with Steganog... Marc Horowitz
- Re: The problem with Steganography Eric Tully
- Re: The problem with Steganography Arnold G. Reinhold
- Re: The problem with Steganog... Russell Nelson
