A mimic function changes a file
so it assumes the statistical properties of another file
. That is, if
is the probability of some substring
occurring in
, then a mimic function
, recodes
so that
approximates
for all strings
of length less than some
. It is commonly considered to be one of the basic techniques for
hiding information, often called
steganography
Steganography ( ) is the practice of representing information within another message or physical object, in such a manner that the presence of the information is not evident to human inspection. In computing/electronic contexts, a computer file, ...
.
The simplest mimic functions use simple statistical models to pick the symbols in the output. If the statistical model says that item
occurs with
probability
Probability is the branch of mathematics concerning numerical descriptions of how likely an Event (probability theory), event is to occur, or how likely it is that a proposition is true. The probability of an event is a number between 0 and ...
and item
occurs with probability
, then a random number is used to choose between outputting
or
with probability
or
respectively.
Even more sophisticated models use reversible
Turing machine
A Turing machine is a mathematical model of computation describing an abstract machine that manipulates symbols on a strip of tape according to a table of rules. Despite the model's simplicity, it is capable of implementing any computer algor ...
s.
References
*
*
*
Steganography
{{Crypto-stub