Академический Документы
Профессиональный Документы
Культура Документы
Acrostics1.
Acrostics2.
Acrostics3.
Fingerprintingisnotadifficultjob providedeither,thatthereareseveral waysofarrangingasentenceinorderto expressthemeaningor,thatbychoosing aflexiblemethodforthefingerprinting itispossibletochoosemanyvariations
Acrostics4.
Acrostics5.
Abasicproblemwhenselecting algorithmsprogrammedtoagreewith instructionsforspatialpositioning,is thattheyarevulnerabletoreformating onawordprocessor.
Acrostics5a.
Abasicproblemwhenselecting algorithmsprogrammedtoagreewith instructionsforspatialpositioning,is thattheyarevulnerabletoreformating onawordprocessor.
Acrostics6.(10columnblock)
B L O G G S F A L E R R R T O B A S E M W C T I I T H A M M E E W R U C R S P I H N M E I T A C E G S D T I T P N A P T H O I R S L R O I N A
Acrostics6a.(9columnblock)
A B E L P D I C S B A S I L E M W L E C T G O R I R O G R T O A G T H I N T I O N P A T I C P R H E N I N G T H M A M M R E E S T R S F O A L
Earlyexamples.
TheCodebreakersDavidKahn. In500BC,slavewassentbyPersian courtierurgingcollaboratortorevolt. Waxtablet; Invisibleink; dotsovertext; fullstopusinganilynedye.
ExamplesofCensorship
Censorsrestricted: Chessgames, Crosswordpuzzles, Newspapercuttings(dottedwithinvisible ink?)
Censorsproblems.
Loosestampswereremovedandreplaced byothersofequaldenomination. Listofknittinginstructionswasheldup whileexaminerknittedsweater.
Hiddenmeanings.
EGofonecablegramwhichstated"Father isdead". Censorreplaceditwith"Fatheris deceased". Replycameback:"Isfatherdeador deceased?"
Flowersontree.
FromGreattruespystoriesAllenDulles.
Copyright&Credibility.
Credibilityofconcealedinformation.
CredibilityvObscurity.
Credibilityvcomplexity.
Obviousorobscure?
Securityvcomplexity.
Secureorobvious?
Utility.
Spatialpositioning.
DigitalImages.
"WatermarkingDigitalImagesforCopyright Protection."
BolandFM,O'Ruanaidh&DautzenbergC. TrinityCollegeDublinandRheinischWestfaelische TechnischeHochschule,Aachen.
HidingindigitalImages.
l.s.b.ofpixelschosentoencodemessage. Messagemightalsobeencrypted. Pixelscanbechosenpseudorandomly. Busypartofpicturebestforhiding. Problemiflossycompressionisused. Spatialspreadspectrummayhelp.
Digitalimages(Bolandetal).
Counterstodatahiding.
Removel.s.b. Detectionofunusualspatialfrequency spectrum. Useofcommercialstegsoftwarehelps analysis. Stirmarkattackdistortsimage. Jitterattackshiftsblocksimperceptively. Mosaicattacksplittingintosubimages.
Computerbased Steganography.
Howitworksandwhythereforeanyrestrictions oncryptographyarenonsense,atbest."
"ComputerbasedSteganography:
FranzE.,MollerS.etal UniversitiesofDresdenandHildesheim
Digitalspeech&music.
Soundrepresentedasasequenceofdigital codehassimilarhidingpropertiestoimages. Frequentmodificationssoundnoisy. Necessarytohidemessageinhighvolume sound. Asilentpassageisequivalenttoblueskyin animage.
Digitalspeech&music.
Perceptionofmodificationsdependson strengthofsignal&rateofmodification. Bit spacing Bigroom,littlebackgroundnoise.63 Countryside,muchbackgroundnoise.7 Countryside,littlebackgroundnoise.15 Telephoneboxinaquietarea.15
Digitalspeech&music.
Inanoisyenvironmenteach8thbitcould bechangedgivingatransmissionrateof 2750bitspersecond. Inaquietenvironmentitwasonlypossible tochangeeach128thbitlimitingthe transmissionto170bitspersecond.
Echo1
Echo2
Applicationsofechomethod.
Computermonitoringtorecordwhen copyrightmaterialisbroadcast. Tocheckthatadvertisingmaterialhasbeen broadcasttherequisitenumberoftimes. Webcrawlerstocheckonsoundbites distributedovertheInternet. Identificationoftelephonecallers.
FractalSystems
"FractalBasedImageSteganography."
ScottM.andDavernP. DublinCityUniversityandCarlowRegional TechnicalCollege.
Fractalcoding(Scott&Davern).
Fractalcoding(Scott&Davern).
Hiddendatachannels.
HidingDataintheOSInetworkmodel. TGHandel&MSandford
LosAlomosNationalLaboratory.
Hiddendatachannels.
Covertchannelsinnetworkprotocol.
EgtogglingCTSandRTShandshake. UnusedfieldsinInternetpacketheader. Sequenceoflegitimatemessages. Timingofcontentionbetweenservices.
Plausibledeniability.
"Thesteganographicfilesystem" RAnderson,RNeedham,AShamir. "AsteganographicfilesystemforLinux" AMcDonald&MKuhn. Cambridge. Multiplefilessystems Onetimepads
Onetimepadmethods.
Thesecurityproblem. Useofirrationalnumbersforpseudo randomnumberkeys. e.g.Squarerootd=6.1=2.469817807...... Sq.root(n*d+c)
ShakespeareBacondebate.
TDBokenhamformerlychairman oftheFrancisBaconsociety. "TheSixtyseventhInquisition" "ABriefhistoryoftheBacon Shakespearecontroversy"
TDBokenham
WH A T T H E Y H A U E ME S & I NCENCEO K E I T UUAS NOF A N D T H E MO S T T H O O U S WH E N T H E Y A O S T H UMB L Y CON T SHAKESPEARE
Shakespeare'stombstone inscription(fromTDBokenham)
TextfromTheTempest.
Thecloudcappedtow'rs,thegorgeouspalaces, Thesolemntemples,thegreatglobeitself, Yea,allwhichitinherit,shalldissolve, Andlikethisinsubstantialpageantfaded, Leavenotarackbehind. TheCloudcuptTowrs. TheGorgeousPalaces, TheSolemnTemples, TheGreatGlobeitfelf, Yea,allwhichitInherit, ShallDifsolve; AndlikethebafelefsFnbrickofaUifiar, Leavenotawrackbehind.
Bokenhamscalculations.
Anagramontombstone.
FNB I.N R.C C.O S.H A.A
Misusesofsteganography.
OtherNumerousattemptsto"prove" FrancisBaconwrotetheShakespeare plays. "Anagrammaticacrostics"byWalter Arensberg 200+character"anagrams"byArthur Cornwall.
Misusesofsteganography.
"Biblecodes"derivedfromacrosticswith verylargeskipdistances. SimilaranalysisofMobyDickalso notionallyforecastdeathsofPresident KennedyandPrincessDiana,andmany othersituations.