[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: Statistics of Low-Order Bits in Images



Some other factors one needs to consider when analyzing images are:

* The lsb is going to be random if the image comes from any kind of a/d
  process. This is because all convertors have a error of +/- 1 bit.

* If an image is processed by software then the last significant bit will be
  on or off consistantly for a given color.

* By the use of exlusive-or operators it is possible to mask the data in a
  suitable manner. This does require that both sender and reciever have a
  copy or method of calculating the correct key.

The process as I understand it now to use a graphical concealment cypher is:

1. Both parties agree a priori on at least a way to generate suitable keys
   for masking.

2. You take your message and x-or it with a suitable bit stream.

3. The resultant x-or bit stream is placed in the image as the lsb.

4. Upon receipt, you strip out the x-or bit stream.

5. Generate the appropriate key and use exclusive-or to return the data
   stream.

The real question is how do you generate keys?

I see a method using the data bit stream itself as part of the answer. The
algorithm would look at some parameter like character statistics or entropy
of a text. It would look at the data stream and calculate its value. Then the
hard part is to try various bit streams and measure their x-or value. The
process is similar to Newtons Iterative Method for finding roots of
polynomials.