[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[FYI] (Fwd) Re: <nettime> "Pirate Utopia," FEED, February 20, 2001




------- Forwarded message follows -------
Date sent:      	Fri, 21 Sep 2001 08:27:00 +1000 (EST)
From:           	Grant Bayley <gbayley@ausmac.net>
To:             	<jmdibbell@home.com>
Copies to:      	<cryptography@wasabisystems.com>
Subject:        	Re: <nettime> "Pirate Utopia," FEED, February 20, 2001


> --- begin forwarded text
>
> Status:  U
> From: "Julian Dibbell" <jmdibbell@home.com>
> To: <nettime-l@bbs.thing.net>
> Subject: <nettime> "Pirate Utopia," FEED, February 20, 2001
> Date: Thu, 20 Sep 2001 08:37:20 -0500
> Sender: nettime-l-request@bbs.thing.net
> Reply-To: "Julian Dibbell" <jmdibbell@home.com>
>
> Key concepts: steganography, encryption, Osama bin Laden,
> intellectual property, temporary autonomous zone, pirates.

It's a shame that Niels Provos, one of the main developers of
open-source Steganography software at the moment wasn't able to detect
a single piece of information hidden steganographically in a recent
survey of two million images...  Sort of destroys the whole hype about
the use of it by criminals.   Details on the paper below:

Date: Sat, 15 Sep 2001 17:36:36 -0600
From: aleph1@securityfocus.com
To: secpapers@securityfocus.com
Subject: Detecting Steganographic Content on the Internet

Detecting Steganographic Content on the Internet
Niels Provos and Peter Honeyman

Steganography is used to hide the occurrence of communication. Recent
suggestions in US newspapers indicate that terrorists use
steganography to communicate in secret with their accomplices. In
particular, images on the internet were mentioned as the communication
medium. While the newspaper articles sounded very dire, none
substantiated these rumors. To determine whether there is
steganographic content on the Internet, this paper presents a
detection framework that includes tools to retrieve images from the
world wide web and automatically detects whether they might contain
steganographic content. To ascertain that hidden messages exist in
images, the detection framework includes a distributed computing
framework for launching dictionary attacks hosted on a cluster of
loosely coupled workstations. We have analyzed two million images
downloaded from eBay actions but have not been able to find a single
hidden message.

http://www.citi.umich.edu/techreports/reports/citi-tr-01-11.pdf
http://www.citi.umich.edu/techreports/reports/citi-tr-01-11.ps.gz





---------------------------------------------------------------------
The Cryptography Mailing List Unsubscribe by sending "unsubscribe
cryptography" to majordomo@wasabisystems.com
------- End of forwarded message -------