<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>stenography &#8211; Phocean.net</title>
	<atom:link href="/tag/stenography/feed" rel="self" type="application/rss+xml" />
	<link>/</link>
	<description>Computer Security Blog</description>
	<lastBuildDate>Fri, 24 Feb 2017 21:17:51 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>https://wordpress.org/?v=4.9.10</generator>
	<item>
		<title>ESFS, new perspectives for stenography ?</title>
		<link>/2011/01/14/esfs-new-perspectives-for-stenography.html</link>
		<pubDate>Fri, 14 Jan 2011 21:43:21 +0000</pubDate>
		<dc:creator><![CDATA[phocean]]></dc:creator>
				<category><![CDATA[Cryptography]]></category>
		<category><![CDATA[Defense]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Encryption]]></category>
		<category><![CDATA[stenography]]></category>

		<guid isPermaLink="false">http://www.phocean.net/?p=952</guid>
		<guid isPermaLink="false">http://www.phocean.net/?p=952</guid>
		<description><![CDATA[Tomas Touceda advertised a new project on Full Disclosure. The idea sounds good, so I will keep an eye on this very interesting project. Though I would like to know more about the methods that were used for encryption and stenography. Code and explanations are on the ESFS project homepage. Beyond the pratical usage, I...<br><i class="icon-right-hand"></i> <span class="read-more"><a href="/2011/01/14/esfs-new-perspectives-for-stenography.html">Continue Reading</a></span>]]></description>
				<content:encoded><![CDATA[<p>Tomas Touceda advertised a new project on Full Disclosure.<br />
The idea sounds good, so I will keep an eye on this very interesting project.<br />
Though I would like to know more about the methods that were used for encryption and stenography.</p>
<p>Code and explanations are on the <a title="ESFS" href="https://github.com/chiiph/esfs" target="_blank">ESFS project homepage</a>.<br />
Beyond the pratical usage, I wonder if it can offer anyhow better resistance to statistical analysis that usually defeat stenography. The author addresses partialy the point on the mailing list:</p>
<blockquote><p>What I meant with hide is that, since it uses the LSBs, you can pick<br />
any image, and &#8220;find data&#8221; in them, so it makes it a little bit harder<br />
to know where you actually have data, and if you really do.</p></blockquote>
<p>To this, a reader named stormrider pointed out <a title="stenography attacks" href="http://www.ece.cmu.edu/~adrian/487-s06/westfeld-pfitzmann-ihw99.pdf" target="_blank">an interesting research document (PDF)</a>, which is a state of the art of the limitations of stenography and the attacks against it. Is it really a dead-end ?</p>
<p>This is indeed a very interesting field of research.</p>
]]></content:encoded>
			</item>
	</channel>
</rss>
