[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Steganography by CAD




Responding to msg by [email protected] (Andrew Brown) on Wed, 
3 Aug  1:17 PM

Andy:


Features for concealment of plain or cyphertext by CAD 
programs:

1.  Plain or cyphertext can be imported by each letter, by 
sentence, by block of text; then manipulated by the CAD program 
as one or multiple concealed CAD entities.

2.  Text manipulation includes:

    Reduce to any scale.
    Place on hidden layers.
    Hide by other entities.
    Distort to a variety of shapes.
    And otherwise disfigure the text into non-recognizable 
forms.

3.  In addition, there are a host of CAD-features for further, 
multiple, transformations of the text, including algorithmic 
permutations.

4.  Subsequent manipulation of the CAD document may include 
exporting to other proprietary and generic CAD formats.

5.  CAD document may then be transmitted plain (in the selected 
CAD format) or encrypted for transmission.

6.  The recipient uses a CAD program (and decryption program if 
needed) to restore the concealed text to its original encrypted 
form.  It is exported to the original encryption program for 
decryption. 

7.  Caveat 1:  While this manipulation will be invisible or 
camouflaged in the CAD document the underlying code of the 
program will provide clues.  However, it should be possible to 
encrypt these clues.

8.  Caveat 2:  Sender and recipient will need to exchange 
protocols, by encrypted transmission probably, for restoring 
the concealed text.

9.  Caveat 3:  This is not elegant and requires little or no 
crypto competency.  But it can be easily done by a CAD operator 
to help conceal sophisticated crypto.


Comments?

John, an architect of the building codes domain.