mimic function
{{inline|date=June 2010}}
A mimic function changes a file so it assumes the statistical properties of another file . That is, if is the probability of some substring occurring in , then a mimic function , recodes so that approximates for all strings of length less than some . It is commonly considered to be one of the basic techniques for hiding information, often called steganography.
The simplest mimic functions use simple statistical models to pick the symbols in the output. If the statistical model says that item occurs with probability and item occurs with probability , then a random number is used to choose between outputting or with probability or respectively.
Even more sophisticated models use reversible Turing machines.
References
- {{cite report | first = Peter | last = Wayner | author-link = Peter Wayner | title = Mimic Functions | publisher = Cornell University Department of Computer Science | id = TR 90-1176 | date = December 1990 | url = http://www.funet.fi/pub/crypt/old/mimic/mimic.text}}
- {{cite journal | first = Peter | last = Wayner | title = Mimic Functions | date = July 1992 | journal = Cryptologia | volume = 16 | number = 3 | pages = 193–214 | doi = 10.1080/0161-119291866883}}
- {{cite book | first = Peter | last = Wayner | title = Disappearing Cryptography | publisher = Morgan Kaufmann | isbn = 978-0123744791 | year = 2008 | edition = 3rd}}
{{Crypto-stub}}