def'n of "computer network"

James A. Donald jamesd at echeque.com
Sat Jul 15 17:29:11 PDT 1995


At 04:25 PM 7/15/95 +0100, Andrew Spring wrote:
> If your attacker has a more sophisticated statistical model of noise
> distributions than you do, then he can deduce the existence of message.

Since each hardware scanning device, and each image source, has 
idiosyncratic forms of noise, it is much harder to detect 
unusual forms of noise, than it is to emulate a usual form
of noise.

The attacker will get a huge number of false positives.  He
will not know if there is a whole lot of stego going on, or
he needs to adjust his noise models for a whole lot of
cranky and/or funky scanners.


--
  ------------------------------------------------------------------
We have the right to defend ourselves	|  http://www.jim.com/jamesd/
and our property, because of the kind	|
of animals that we are. True law	|  James A. Donald
derives from this right, not from the	|
arbitrary power of the omnipotent state.|  jamesd at echeque.com







More information about the cypherpunks-legacy mailing list