In encryption there is pretty much a direct correlation between damage done by errors and the strength of the block cipher mode. After all, a good cipher will produce entirely different cipher text for two plaintexts that are slightly different. Vice versa, a tiny change to the ciphertext will produce two entirely different plaintexts. There are block cipher modes that attempt to limit the scope of errors to nearby blocks, but not as a general error correction scheme.
Instead, if you want your ciphertext to be resistant to errors, you should further encode it with an error correction code. The receiver would first decode and correct errors, then decrypt.
sm625 said:
On a side note I wish more people knew about steganography, because if they did then they would see the farce in all our alphabet soup agencies and how it is nothing but a huge scam and a racket. We or they nor anyone else has any idea how much encrypted information passes under our noses every day, and we will never know.
Actually, steganography has fallen out of favor for two reasons. First, it's pretty tough to develop a system that isn't easy to detect. The common way to detect steganography is to run a statistical analysis on the data of interest and compare to known distributions. For example, think somebody is encoding information in timing delays between IP packets? Measure the distribution of the time between packets and compare to what you'd get from normal traffic. Statistical tools can do some really in-depth analysis with barely any user input, making it really tough to come up with something undetectable.
Second, you need a huge amount of data in which to hide your information. The general rule is at least 10 times. So if you want to hide a 4 MB picture taken from your phone you need at least a 40 MB picture (for image-in-image steg anyway). And that's suspicious right there. Or you can split it up and take 10 photos for every one you want to hide. Not very convenient.
sm625 said:
Did you know that it is possible to encrypt a voice over a smartphone directly into a recorded voice of a completely different person? You could have two male muslim terrorists discussing plans over an open line, but all the FBI will hear in their wiretaps is a scandinavian female voice saying "Honey, can you stop by the store and pick up some bread?" Its such a joke I cannot believe people tolerate such blatant wasting of taxpayer dollars.
Your example is actually
extremely difficult. Voice encodings are already so compressed (often dynamically, based on the nature of the voice) that it is really tough to do voice-based steganography, to the point that it's basically a no-go.
Furthermore, the point of steganography is to hide in plain site, to not stand out. Which do you think stands out more: a 30 second conversation in Arabic between two Muslim men at the bazaar, or an hour-long recording of a Scandinavian woman's voice ordering groceries on a cell phone in North Africa?
😉