Cryptography Reference
In-Depth Information
hidden message when the disguise is chopped or truncated. A
snippet can still reveal enough information.
How Secure Is It? This construction doesn't add any security itself,
but it does offer it indirectly by making it possible to recover
information from partial fragments.
How to Use It? If you have a short message and a long cover file, re-
peat the message throughout the cover file numerous. This
only works onmethods that don't base the encoding on the rel-
ative position in the file. Random walks that leave the stegano-
graphic method in places won't work. The algorithms should
use some regular hiding algorithm that will be possible to pick
up even after cropping.
Further Reading
S. Manoharan describes how self-synchronizing codes can
solve issues created by cropping and sampling. [Man03]
Search WWH ::




Custom Search