Mimic function

A mimic function changes a file A so it assumes the statistical properties of another file B. That is, if p(t,A) is the probability of some substring t occurring in A, then a mimic function f, recodes A so that p(t,f(A)) approximates p(t,B) for all strings t of length less than some n. It is commonly considered to be one of the basic techniques for hiding information, often called steganography.

The simplest mimic functions use simple statistical models to pick the symbols in the output. If the statistical model says that item x occurs with probability p(x,A) and item y occurs with probability p(y,A), then a random number is used to choose between outputting x or y with probability p(x,A) or p(y,A) respectively.

More sophisticated mimic functions use grammar-based models of B to structure the output. One example, "SpamMimic", uses a context free grammar to model the structure of a typical spam email message. It will convert the input file A to read like a spam message.

Even more sophisticated models use reversible Turing machines.

References

This article is issued from Wikipedia - version of the Sunday, December 14, 2014. The text is available under the Creative Commons Attribution/Share Alike but additional terms may apply for the media files.