I headed to the library to check out what they had, crypto-wise. I found one book copyright 1939, which had a chapter on methods of steganography. Some of the suggestions I got from it: -Use every third letter of each word. -Use every nth letter of each word, where n varies depending on a key. (e.g., 2-4-1-5-5-3) -use every nth word of a sentence. -encode in base-3 before steganizing. -use the number of syllables in a word. -use the number of words in a sentence. Irrelevant suggestions: -use different fonts. (within the same word.) -use broken and whole pickets in a fence. -use empty and full positions in a cartridge-belt, as in machine gun. -use invisible ink instead, it's easier. :-) Maybe these will help those more able to program than myself. Kragen.
Kragen Sittler writes:
I headed to the library to check out what they had, crypto-wise. I found one book copyright 1939, which had a chapter on methods of steganography.
Some of the suggestions I got from it: -Use every third letter of each word. -Use every nth letter of each word, where n varies depending on a key. (e.g., 2-4-1-5-5-3) -use every nth word of a sentence ...rest elided...
Was this "Cryptanalysis," by Helen Gaines? Or the Herbert S. Zim popularization? Both are very dated. Somehow I don't think 1939 methods will be real useful in a 1993 world. But the book may be educational...you have to crawl before you can walk, etc. (Kahn's "The Codebreakers" has some good stuff on hiding messages, mostly from World War II...think about it, those spies may've used your 1939 book as a tutorial!) There haven't been many recent books dealing explicitly with steganography, though modern crypto texts like Brassard's "Modern Cryptology," the Antichrist's "Cryptography and Data Security" (Dorothy Denning), or Salomaa's "Public Key Cryptography" are good sources. And conference proceedings (annual "Crypto" conferences) should have some articles on "covert channels" and the like. You can find these books in (most) large university libraries or in (many) technical bookstores. If the only crypto book you have access to is from 1939, find a larger library. Happy reading! -Tim May -- .......................................................................... Timothy C. May | Crypto Anarchy: encryption, digital money, tcmay@netcom.com | anonymous networks, digital pseudonyms, zero 408-688-5409 | knowledge, reputations, information markets, W.A.S.T.E.: Aptos, CA | black markets, collapse of governments. Higher Power: 2^756839 | Public Key: PGP and MailSafe available. Note: I put time and money into writing this posting. I hope you enjoy it.
participants (2)
-
tcmay@netcom.com
-
TO1SITTLER@APSICC.APS.EDU