You Can Hide Secret Messages in Fake Academic Writing

Illustration for article titled You Can Hide Secret Messages in Fake Academic Writing

Ten years ago, a trio of MIT students created SCIgen, a program that spits out gibberish academic papers that have, improbably, since been published in real journals. Many embarrassing catches later, SCIgen’s creators are back with something even better: SCIpher.


Like SCIgen, SCIpher uses context-free grammar filled with randomly generated computer science buzzwords. (The creators, Jeremy Striblingm, Dan Aguayo, and Max Krohn, were all graduate students at MIT’s Computer Science and Artificial Intelligence Lab back in 2005.) But SCIpher adds the extra element of steganography to its fake conference advertisements. Instead of plucking out random words, it generates them based on a secret input message.

Now, this obviously is not a secure way to send messages because it’s easily decoded by anyone with the encryption code. (By the way, here it is.) But it does perfectly advance the trio’s stated goal of “maximum amusement.”


You can fool around with SCIpher yourself. This is what a SCIpher-generated conference proceeding looks like, and yes, there’s a secret message hidden in it.

CFP: the 14th Annual CYUFP Workshop on knowledge-based, ‘ smart ‘ epistemologies in Shenyang, China

Greetings list owner and Colleagues,

The objective of CYUFP is to supply a seminar for scholars and systems engineers from adaptive operating systems, randomized electrical engineering, and interposable chip design to offer their unconventional research results, theories, and research results in offering the exploration of multimodal models and von Neumann machines. Without a doubt, CYUFP releases sporadic visionary drafts, new articles, and half-baked abstracts in all aspects of atomic high-performance computing. The topic of CYUFP is ‘ interfering robust theory and systems for graduate students: multimodal superblocks for the cryptographers ‘, interchanging the bastardization of multicore epistemologies, the understanding of lambda calculus with 8 bit architectures that paved the way for the understanding of information retrieval systems, and homogeneous methodologies in arguing perfect heuristics of elliptical machine learning. Thusly, our special issue releases advanced abstracts on confirming that context-free grammar with massive multiplayer online role-playing games and A* search can collude to address this issue.

Topics of interest include, but are not limited to: Saturated artificial intelligence

Steering Committee: Weldon Mccoy (National Chiao Tung University)

General Co-Chairs: Meghan Sexton - University at Buffalo The State University of New York Madeline Dunlap - Vrije Universiteit Brussel

Previous locations: University of Mississippi National University of Ireland Maynooth Huludao, China Seoul, South Korea

Advisor Committee: Loyd Mcknight (National University of Rosario) Doris Pham (Martin Luther University of Halle-Wittenberg)

Keynote speakers: * Assistant Professor Scot Escobar - Technical University of Denmark A practical unification of evolutionary programming with public-private key pairs and journaling file systems that made constructing and possibly architecting agents a reality * Kirstin Hampton - LSU Health Sciences Center New Orleans On the understanding of A* search with active networks * Ollie Hao - Taipei Medical University A understanding of the Ethernet

We are delivering you this CFP, trusting that you will consider submitting several works to this special issue. Notably, scientists are encouraged to submit their articles by mail. Please discover the submission guidelines and other information on the conference website.

[SCIpher via MIT]

Top image: Screenshot of a fake paper generated by Scigen


Share This Story

Get our newsletter


Joe the Tech

And here I am without my Capt. Midnight Decoder Ring.