Mimic_function

Mimic function

A mimic function changes a file so it assumes the statistical properties of another file . That is, if is the probability of some substring occurring in , then a mimic function , recodes so that approximates for all strings of length less than some . It is commonly considered to be one of the basic techniques for hiding information, often called steganography.

The simplest mimic functions use simple statistical models to pick the symbols in the output. If the statistical model says that item occurs with probability Failed to parse (SVG (MathML can be enabled via browser plugin): Invalid response ("Math extension cannot connect to Restbase.") from server "http://localhost:6011/en.wikipedia.org/v1/":): {\displaystyle p(x,A)} and item occurs with probability Failed to parse (SVG (MathML can be enabled via browser plugin): Invalid response ("Math extension cannot connect to Restbase.") from server "http://localhost:6011/en.wikipedia.org/v1/":): {\displaystyle p(y,A)} , then a random number is used to choose between outputting or with probability or respectively.

Even more sophisticated models use reversible Turing machines.

References

  • Wayner, Peter (December 1990). Mimic Functions (Report). Cornell University Department of Computer Science. TR 90-1176.
  • Wayner, Peter (July 1992). "Mimic Functions". Cryptologia. 16 (3): 193–214. doi:10.1080/0161-119291866883.
  • Wayner, Peter (2008). Disappearing Cryptography (3rd ed.). Morgan Kaufmann. ISBN 978-0123744791.

Share this article:

This article uses material from the Wikipedia article Mimic_function, and is written by contributors. Text is available under a CC BY-SA 4.0 International License; additional terms may apply. Images, videos and audio are available under their respective licenses.