I think a good strategy for anyone who may potentially have to go through this situation is to roll your own encryptor/encoder to combine several sets of data in to a single dataset, and having multiple keys associated with it. Depending on which key you use, you will get a different output. From the outside it will look like a simple way to disguise a already encrypted dataset.<p>A decoy in simple.