Re: Steganography By Frequency ? – A Thought.

It is valid for your stego plan to be used secretly. Alice could have
a meeting with Bob and tell him your Stego plan and they could use it
secretly. It is important that Alice does not continue on to Twitter
to post the stego plan she has started with Bob. If Alice put your
stego plan on the internet, the NSA and Vauxhall Cross code breakers
will keep track of this stego plan.

Often, a cryptographer has no Bob who is so compliant about messaging.
Alice and Bob would not need to meet if they used public key
cryptography. It is fun to create stego algorithms for text and there
are a billion ways to do it. Your plan is reasonable. The indexing
method is easy to remember. Thanx.