There is a paper about about an experiment to try and locate examples of stenography on eBay (the paper was mentioned recently during a discussion of terrorist use of encryption/stenography). Although the study only involved information hidden in JPEG images, I'm sure the principles could be more widely applied. http://www.citi.umich.edu/techreports/citi-tr-01-11.pdf Hope this is helpful, Julian ----------------------------------------------------------------- This list is provided by the SecurityFocus ARIS analyzer service. For more information on this free incident handling, management and tracking system please see: http://aris.securityfocus.com
This archive was generated by hypermail 2b30 : Thu Oct 04 2001 - 19:05:26 PDT