detect the presence of steganographic content. Before
embedding data into an image, OutGuess can determine the maximum
message size that can be hidden while still being able to maintain
statistics based on frequency counts.
Regards,
Niels Provos.
In message <962j9b$bd5$[EMAIL PROTECTED]>, David Wagner writes:
> * Use a VPN with strong end-to-end cryptographic authentication
>and encryption (e.g., IPSEC or equivalent)
At CITI, we protect the traffic between base station and wavelan
clients via IPsec. The setup is very simple and it wor
In message <[EMAIL PROTECTED]>, David Honig writ
es:
>1. Measure at the stats on the least significant bits from your cover
>source.
>2. Shape the uniform distribution you get after encryption into
>the form you observe from your coverbits.
>3. Replace.
This approach is flawed. The distribution
In message <[EMAIL PROTECTED]>, Marc Horowitz writes:
>else, ciphertext more than incrementally larger than plaintext is a
>red flag), and will demand both documents. I could conceive of stego
>which might permit this, since large expansion ratios are normal, but
>if you're doing stego, and they'
Hi Damien,
I just submitted a paper about encrypting the backing store of a
virtual memory system to the USENIX security conference.
You might want to use the encrypted block number as IV. In the paper, I
wrote:
For swap encryption, the initial 128-bit IV is [based on] the 64-bit
block numb