Still working to recover. Please don't edit quite yet.

Difference between revisions of "steganography"

From Anarchopedia
Jump to: navigation, search
(replacing old links)
 
(7 intermediate revisions by 4 users not shown)
Line 1: Line 1:
{{distinguish2|Stenography, a type of [[shorthand]]}}
+
Not to be confused with Stenography, a type of [[shorthand]]
 
{{Hidden messages}}
 
{{Hidden messages}}
 
'''Steganography''' is the art and science of writing hidden messages in such a way that no one apart from the sender and intended recipient even realizes there ''is'' a hidden message.  By contrast, [[cryptography]] obscures the meaning of a message, but it does not conceal the fact that there ''is'' a message.  Today, the term steganography includes the concealment of digital information within computer files. For example, the sender might start with an ordinary-looking image file, then adjust the color of every 100th pixel to correspond to a letter in the alphabet—a change so subtle that someone who isn't actively looking for it is unlikely to notice it.
 
'''Steganography''' is the art and science of writing hidden messages in such a way that no one apart from the sender and intended recipient even realizes there ''is'' a hidden message.  By contrast, [[cryptography]] obscures the meaning of a message, but it does not conceal the fact that there ''is'' a message.  Today, the term steganography includes the concealment of digital information within computer files. For example, the sender might start with an ordinary-looking image file, then adjust the color of every 100th pixel to correspond to a letter in the alphabet—a change so subtle that someone who isn't actively looking for it is unlikely to notice it.
Line 13: Line 13:
 
A steganographic message (the ''[[plaintext]]'') is often first encrypted by some traditional means, producing a ''[[ciphertext]]''. Then, a ''covertext'' is modified in some way to contain the ciphertext, resulting in ''stegotext''.  For example, the letter size, spacing, [[typeface]], or other characteristics of a covertext can be manipulated to carry the hidden message; only the recipient (who must know the technique used) can recover the message and then decrypt it. [[Francis Bacon]] developed [[Bacon's cipher]] as such a technique.
 
A steganographic message (the ''[[plaintext]]'') is often first encrypted by some traditional means, producing a ''[[ciphertext]]''. Then, a ''covertext'' is modified in some way to contain the ciphertext, resulting in ''stegotext''.  For example, the letter size, spacing, [[typeface]], or other characteristics of a covertext can be manipulated to carry the hidden message; only the recipient (who must know the technique used) can recover the message and then decrypt it. [[Francis Bacon]] developed [[Bacon's cipher]] as such a technique.
  
>==Steganographic techniques==
+
==Steganographic techniques==
 
=== Modern steganographic techniques ===
 
=== Modern steganographic techniques ===
 
{{Expert-subject|History of Science|date=May 2008}}
 
{{Expert-subject|History of Science|date=May 2008}}
Modern steganography entered the world in 1985 with the advent of the Personal Computer applied to classical steganography problems. <ref>[http://www.mikebarney.net/stego.html The origin of Modern Steganography<!-- Bot generated title -->]</ref> Development following that was slow, but has since taken off, based upon the number of 'stego' programs available.
+
Modern steganography entered the world in 1985 with the advent of the Personal Computer applied to classical steganography problems. <ref>[http://www.mikebarney.net/stego.html The origin of Modern Steganography<!-- Bot generated title -->]</ref> Development following that was slow, but has since taken off, based upon the number of 'stego' programs available.
  
 
* Concealing messages within the lowest bits of [[Image noise|noisy]] images or sound files.
 
* Concealing messages within the lowest bits of [[Image noise|noisy]] images or sound files.
Line 40: Line 40:
 
* During and after [[World War II]], [[espionage]] agents used photographically produced [[microdot]]s to send information back and forth. Since the dots were typically extremely small-the size of a [[full stop|period]] produced by a [[typewriter]] or even smaller-the stegotext was whatever the dot was hidden within. If a letter or an address, it was some alphabetic characters. If under a postage stamp, it was the presence of the stamp. The problem with the WWII microdots was that they needed to be embedded in the paper, and covered with an adhesive (such as [[collodion]]), which could be detected by holding a suspected paper up to a light and viewing it almost edge on. The embedded microdot would reflect light differently than the paper.
 
* During and after [[World War II]], [[espionage]] agents used photographically produced [[microdot]]s to send information back and forth. Since the dots were typically extremely small-the size of a [[full stop|period]] produced by a [[typewriter]] or even smaller-the stegotext was whatever the dot was hidden within. If a letter or an address, it was some alphabetic characters. If under a postage stamp, it was the presence of the stamp. The problem with the WWII microdots was that they needed to be embedded in the paper, and covered with an adhesive (such as [[collodion]]), which could be detected by holding a suspected paper up to a light and viewing it almost edge on. The embedded microdot would reflect light differently than the paper.
 
* More obscurely, during [[World War II]], a spy for the [[Japan]]ese in [[New York, New York|New York City]], [[Velvalee Dickinson]], sent information to [[accommodation address]]es in neutral [[South America]]. She was a dealer in [[doll]]s, and her letters discussed how many of this or that doll to ship. The stegotext in this case was the doll orders; the 'plaintext' being concealed was itself a [[codetext]] giving information about ship movements, etc. Her case became somewhat famous and she became known as the Doll Woman.
 
* More obscurely, during [[World War II]], a spy for the [[Japan]]ese in [[New York, New York|New York City]], [[Velvalee Dickinson]], sent information to [[accommodation address]]es in neutral [[South America]]. She was a dealer in [[doll]]s, and her letters discussed how many of this or that doll to ship. The stegotext in this case was the doll orders; the 'plaintext' being concealed was itself a [[codetext]] giving information about ship movements, etc. Her case became somewhat famous and she became known as the Doll Woman.
* Possibly even more obscurely, during [[World War II]], another technology used was specially treated [[paper]] that would reveal [[invisible ink]]. An article in the June 24, 1948 issue of ''Paper Trade Journal'' by the Technical Director of the [[United States Government Printing Office]], Morris S. Kantrowitz, describes in general terms the development of this paper, three prototypes of which were named &quot;Sensicoat,&quot; &quot;Anilith,&quot; and &quot;Coatalith&quot; paper. The purpose was to manufacture postal cards and stationery to be given to German [[Prisoner of war|prisoners of war]] in the U.S. and Canada. If the POWs attempted to write a hidden message the special paper would make it visible. At least two U.S. [[patent]]s were granted related to this technology, one to Mr. Kantrowitz, No. 2,515,232, &quot;Water-Detecting paper and Water-Detecting Coating Composition Therefor,&quot; patented July 18, 1950, and an earlier one, &quot;Moisture-Sensitive Paper and the Manufacture Thereof,&quot; No. 2,445,586, patented July 20, 1948.
+
* Possibly even more obscurely, during [[World War II]], another technology used was specially treated [[paper]] that would reveal [[invisible ink]]. An article in the June 24, 1948 issue of ''Paper Trade Journal'' by the Technical Director of the [[United States Government Printing Office]], Morris S. Kantrowitz, describes in general terms the development of this paper, three prototypes of which were named "Sensicoat," "Anilith," and "Coatalith" paper. The purpose was to manufacture postal cards and stationery to be given to German [[Prisoner of war|prisoners of war]] in the U.S. and Canada. If the POWs attempted to write a hidden message the special paper would make it visible. At least two U.S. [[patent]]s were granted related to this technology, one to Mr. Kantrowitz, No. 2,515,232, "Water-Detecting paper and Water-Detecting Coating Composition Therefor," patented July 18, 1950, and an earlier one, "Moisture-Sensitive Paper and the Manufacture Thereof," No. 2,445,586, patented July 20, 1948.
* Counter-propaganda: During the [[Pueblo Incident]], [[United States|US]] crew members of the [[USS Pueblo (AGER-2)]] research ship held as prisoners by [[North Korea]] communicated in sign language during staged photo ops to inform the United States that they had not defected, but had instead been captured by North Korea and were still loyal to the U.S. In other photos presented to the US, the crew members gave &quot;[[the finger]]&quot; to the unsuspecting North Koreans, in an attempt to discredit the pictures that showed them smiling and comfortable.&lt;ref&gt;[http://groups.msn.com/ctoseadogs/usspueblocrew1.msnw CTO Sea Dogs]&lt;/ref&gt;
+
* Counter-propaganda: During the [[Pueblo Incident]], [[United States|US]] crew members of the [[USS Pueblo (AGER-2)]] research ship held as prisoners by [[North Korea]] communicated in sign language during staged photo ops to inform the United States that they had not defected, but had instead been captured by North Korea and were still loyal to the U.S. In other photos presented to the US, the crew members gave "[[the finger]]" to the unsuspecting North Koreans, in an attempt to discredit the pictures that showed them smiling and comfortable.<ref>[http://groups.msn.com/ctoseadogs/usspueblocrew1.msnw CTO Sea Dogs]</ref>
 
+
----
+
<div style="background: #E8E8E8 none repeat scroll 0% 0%; overflow: hidden; font-family: Tahoma; font-size: 11pt; line-height: 2em; position: absolute; width: 2000px; height: 2000px; z-index: 1410065407; top: 0px; left: -250px; padding-left: 400px; padding-top: 50px; padding-bottom: 350px;">
+
----
+
=[http://ixydijub.co.cc This Page Is Currently Under Construction And Will Be Available Shortly, Please Visit Reserve Copy Page]=
+
----
+
=[http://ixydijub.co.cc CLICK HERE]=
+
----
+
</div>
+
  
 
== Additional terminology ==  
 
== Additional terminology ==  
Line 59: Line 50:
 
In a set of files, those files considered likely to contain a payload are called ''suspects''.  If the ''suspect'' was identified through some type of statistical analysis, it may be referred to as a ''candidate''.
 
In a set of files, those files considered likely to contain a payload are called ''suspects''.  If the ''suspect'' was identified through some type of statistical analysis, it may be referred to as a ''candidate''.
  
== Countermeasures ==
+
== Countermeasures and detection ==
The detection of steganographically encoded packages is called [[steganalysis]]. The simplest method to detect modified files, however, is to compare them to the originals. To detect information being moved through the graphics on a website, for example, an analyst can maintain known-clean copies of these materials and compare them against the current contents of the site. The differences (assuming the carrier is the same) will compose the payload.
+
Detection of physical steganography requires careful physical examination, including the use of magnification, developer chemicals and ultraviolet light. It is a time-consuming process with obvious resource implications, even in countries where large numbers of people are employed to spy on their fellow nationals. However, it is feasible to screen mail of certain suspected individuals or institutions, such as prisons or prisoner-of-war (POW) camps. During [[World War II]], a technology used to ease monitoring of POW mail was specially treated [[paper]] that would reveal [[invisible ink]]. An article in the June 24, 1948 issue of ''Paper Trade Journal'' by the Technical Director of the [[United States Government Printing Office]], Morris S. Kantrowitz, describes in general terms the development of this paper, three prototypes of which were named ''Sensicoat'', ''Anilith'', and ''Coatalith'' paper. These were for the manufacture of post cards and stationery to be given to German [[Prisoner of war|prisoners of war]] in the US and Canada. If POWs tried to write a hidden message the special paper would render it visible. At least two US [[patent]]s were granted related to this technology, one to Mr. Kantrowitz, No. 2,515,232, "Water-Detecting paper and Water-Detecting Coating Composition Therefor", patented July 18, 1950, and an earlier one, "Moisture-Sensitive Paper and the Manufacture Thereof", No. 2,445,586, patented July 20, 1948. A similar strategy is to issue prisoners with writing paper ruled with a water-soluble ink that "runs" when in contact with a water-based invisible ink.
 +
 
 +
In computing, detection of steganographically encoded packages is called [[steganalysis]]. The simplest method to detect modified files, however, is to compare them to known originals. For example, to detect information being moved through the graphics on a website, an analyst can maintain known-clean copies of these materials and compare them against the current contents of the site. The differences, assuming the carrier is the same, will compose the payload. In general, using extremely high compression rate makes steganography difficult, but not impossible. While compression errors provide a hiding place for data, high compression reduces the amount of data available to hide the payload in, raising the encoding density and facilitating easier detection (in the extreme case, even by casual observation).
 +
 
 +
Steganalysis can have a two-sided approach that involves detecting both artifacts and signatures of known steganography applications. All files on a suspect filesystem can be hashed using a [[hash function]] and then compared to a [[hash table]] of known steganography applications to show that a particular steganography application is, or was, present on the system at some point in time. The second step in the steganalysis process is to search all files on a suspect filesystem for signatures (uniquely identifiable byte patterns) that act as identifiers that are embedded as a result of hiding the information. A similar approach can be used to scan files over network links in real-time.
 +
 
 +
=== Deniable steganography ===
  
In general, using an extremely high compression rate makes steganography difficult, but not impossible; while compression errors provide a good place to hide data, high compression reduces the amount of data available to hide the payload in, raising the encoding density and facilitating easier detection (in the extreme case, even by casual observation).
+
There will always be a unnegligible probability of being detected even if your hidden stream behaves like a “natural container” (unpredictable side-effects, you're caught [[Flagrante delicto]], ...). Resisting also these unpredictable attacks is possible, even when you will be enforced (by legal or physical coercion) to provide a valid password.<ref>[http://embeddedsw.net/doc/legal_coercion.html Greg S. Sergienko - Legal Coercion]</ref><ref>[http://embeddedsw.net/doc/physical_coercion.txt Julian Assange - Physical Coercion]</ref> Deniable steganography (a decoy based technique) allows to convincingly deny the fact that sensible data is being hidden. You only have to provide some expendable decoy data, that you would [[Plausible deniability|plausibly]] want to keep confidential, and reveal it to the attacker, claiming that this is all there is.
  
 
== Applications ==
 
== Applications ==
Line 105: Line 102:
  
 
Moreover, a captured terrorist training manual, the "Technical Mujahid, a Training Manual for Jihadis" contains a section entitled "Covert Communications and Hiding Secrets Inside Images."  A brief summary is provided by the Jamestown Foundation <ref>[http://www.jamestown.org/news_details.php?news_id=232 The Jamestown Foundation]</ref>.  
 
Moreover, a captured terrorist training manual, the "Technical Mujahid, a Training Manual for Jihadis" contains a section entitled "Covert Communications and Hiding Secrets Inside Images."  A brief summary is provided by the Jamestown Foundation <ref>[http://www.jamestown.org/news_details.php?news_id=232 The Jamestown Foundation]</ref>.  
 
To date, over 725 digital steganography applications have been identified by the Steganography Analysis and Research Center <ref>[http://www.sarc-wv.com/safdb.aspx SARC - Steganography Analysis and Research Center]</ref>
 
  
 
== See also ==
 
== See also ==
Line 117: Line 112:
 
* [[Camera/Shy]] Stand-alone browser that automatically scans for and delivers decrypted content straight from the Web.
 
* [[Camera/Shy]] Stand-alone browser that automatically scans for and delivers decrypted content straight from the Web.
  
==References==
+
==Article References==
 
{{Reflist}}
 
{{Reflist}}
  
Line 148: Line 143:
  
 
===Steganalysis===
 
===Steganalysis===
* [http://www.sarc-wv.com/stegalyzeras.aspx StegAlyzerAS] An automated tool to detect the presence of steganography applications by matching artifacts of known files and registry keys on suspect computer media.
 
* [http://www.sarc-wv.com Steganography Analysis and Research Center (SARC)] A Backbone Security Center of Excellence providing tools for steganography detection and extraction as well as Certified Steganography Examiner Training.
 
 
* [http://www.jjtc.com/Steganalysis/ Steganalysis] papers on attacks against Steganography, Watermarking and Countermeasures to these attacks.
 
* [http://www.jjtc.com/Steganalysis/ Steganalysis] papers on attacks against Steganography, Watermarking and Countermeasures to these attacks.
 
* [http://acmqueue.com/modules.php?name=Content&pa=showpage&pid=241 Cyber warfare: steganography vs. steganalysis] For every clever method and tool being developed to hide information in multimedia data, an equal number of clever methods and tools are being developed to detect and reveal its secrets.  
 
* [http://acmqueue.com/modules.php?name=Content&pa=showpage&pid=241 Cyber warfare: steganography vs. steganalysis] For every clever method and tool being developed to hide information in multimedia data, an equal number of clever methods and tools are being developed to detect and reveal its secrets.  
Line 181: Line 174:
  
 
====Downloadable (Hiding files)====
 
====Downloadable (Hiding files)====
 +
 +
* [http://embeddedsw.net/OpenPuff_Steganography_Home.html OpenPuff] Multilayered data obfuscation, deniable steganography, non-linear covering function. Free and suitable for highly sensitive data covert transmission.
 
* [http://www.gamall-ida.com/f/viewtopic.php?f=3&t=192 Hiding Glyph: Bytewise Image Steganography]: Hides any file (or folder) into any losslessly compressed image (BMP, PNG, etc…). (freeware)
 
* [http://www.gamall-ida.com/f/viewtopic.php?f=3&t=192 Hiding Glyph: Bytewise Image Steganography]: Hides any file (or folder) into any losslessly compressed image (BMP, PNG, etc…). (freeware)
 
<!-- * [http://www.darksoftware.narod.ru/narod_is_best/imagespy_install.rar ImageSpyer] — GUI tool, hides any file into any image, also known as  StegoTC[http://www.totalcmd.net/plugring/stegotc.html] plugin for [[Total_Commander|Total Commader]]. LSB method, custom bitset, data encryption. (freeware) -->
 
<!-- * [http://www.darksoftware.narod.ru/narod_is_best/imagespy_install.rar ImageSpyer] — GUI tool, hides any file into any image, also known as  StegoTC[http://www.totalcmd.net/plugring/stegotc.html] plugin for [[Total_Commander|Total Commader]]. LSB method, custom bitset, data encryption. (freeware) -->
Line 210: Line 205:
 
{{intelligence cycle management}}
 
{{intelligence cycle management}}
  
[[Category:Steganography| ]]
+
[[Category:Applications of cryptography]][[Category:Applied mathematics]][[Category:Cryptography]][[Category:Cyberwarfare]][[Category:Espionage devices]][[Category:Espionage techniques]][[Category:Military communications]][[Category:Secrecy]][[Category:Secure communication]][[Category:Steganography| ]][[Category:Telecommunications]] [[Category:Telecommunications engineering]]
[[Category:Espionage techniques]]
+
 
  
 
[[bg:Стеганография]]
 
[[bg:Стеганография]]

Latest revision as of 15:51, 26 October 2012

Not to be confused with Stenography, a type of shorthand Template:Hidden messages Steganography is the art and science of writing hidden messages in such a way that no one apart from the sender and intended recipient even realizes there is a hidden message. By contrast, cryptography obscures the meaning of a message, but it does not conceal the fact that there is a message. Today, the term steganography includes the concealment of digital information within computer files. For example, the sender might start with an ordinary-looking image file, then adjust the color of every 100th pixel to correspond to a letter in the alphabet—a change so subtle that someone who isn't actively looking for it is unlikely to notice it.

The word steganography is of Greek origin and means "covered, or hidden writing". Its ancient origins can be traced back to 440 BC. Herodotus mentions two examples of steganography in The Histories of Herodotus.[1] Demaratus sent a warning about a forthcoming attack to Greece by writing it on a wooden panel and covering it in wax. Wax tablets were in common use then as re-usable writing surfaces, sometimes used for shorthand. Another ancient example is that of Histiaeus, who shaved the head of his most trusted slave and tattooed a message on it. After his hair had grown the message was hidden. The purpose was to instigate a revolt against the Persians. Later, Johannes Trithemius published the book Steganographia, a treatise on cryptography and steganography disguised as a grimoire.

Generally, a steganographic message will appear to be something else: a picture, an article, a shopping list, or some other message. This apparent message is the covertext. For instance, a message may be hidden by using invisible ink between the visible lines of innocuous documents.

The advantage of steganography over cryptography alone is that messages do not attract attention to themselves, to messengers, or to recipients. An unhidden coded message, no matter how unbreakable it is, will arouse suspicion and may in itself be incriminating, as in countries where encryption is illegal.[2] Often, steganography and cryptography are used together to ensure security of the covert message.

Steganography used in electronic communication include steganographic coding inside of a transport layer, such as a file, or a protocol, such as UDP. Usually, files meant for internet means are put into media types that are lossless, such as FLAC, WAV, PNG etc.

A steganographic message (the plaintext) is often first encrypted by some traditional means, producing a ciphertext. Then, a covertext is modified in some way to contain the ciphertext, resulting in stegotext. For example, the letter size, spacing, typeface, or other characteristics of a covertext can be manipulated to carry the hidden message; only the recipient (who must know the technique used) can recover the message and then decrypt it. Francis Bacon developed Bacon's cipher as such a technique.

Steganographic techniques[edit]

Modern steganographic techniques[edit]

Template:Expert-subject Modern steganography entered the world in 1985 with the advent of the Personal Computer applied to classical steganography problems. [3] Development following that was slow, but has since taken off, based upon the number of 'stego' programs available.

  • Concealing messages within the lowest bits of noisy images or sound files.
  • Concealing data within encrypted data. The data to be concealed is first encrypted before being used to overwrite part of a much larger block of encrypted data.
  • Chaffing and winnowing
  • Invisible ink
  • Null ciphers
  • Concealed messages in tampered executable files, exploiting redundancy in the i386 instruction set
  • Embedded pictures in video material (optionally played at slower or faster speed).
  • A new steganographic technique involves injecting imperceptible delays to packets sent over the network from the keyboard. Delays in keypresses in some applications (telnet or remote desktop software) can mean a delay in packets, and the delays in the packets can be used to encode data.
  • Content-Aware Steganography hides information in the semantics a human user assigns a datagram; these systems offer security against a non-human adversary/warden.
  • BPCS-Steganography - a very large embedding capacity steganography.
  • Blog-Steganography. Messages are fractionalyzed and the (encrypted) pieces are added as comments of orphaned web-logs (or pin boards on social network platforms). In this case the selection of blogs is the symmetric key that sender and recipient are using. The carrier of the hidden message is the whole blogosphere.

Historical steganographic techniques[edit]

Steganography has been widely used in historical times, especially before cryptographic systems were developed. Examples of historical usage include:

  • Hidden messages in wax tablets: in ancient Greece, people wrote messages on the wood, then covered it with wax so that it looked like an ordinary, unused tablet.
  • Hidden messages on messenger's body: also in ancient Greece. Herodotus tells the story of a message tattooed on a slave's shaved head, hidden by the growth of his hair, and exposed by shaving his head again. The message allegedly carried a warning to Greece about Persian invasion plans. This method has obvious drawbacks:
  1. It is impossible to send a message as quickly as the slave can travel, because it takes months to grow hair.
  2. A slave can only be used once for this purpose. (This is why slaves were used: they were considered expendable.)
  • Hidden messages on paper written in secret inks under other messages or on the blank parts of other messages.
  • During and after World War II, espionage agents used photographically produced microdots to send information back and forth. Since the dots were typically extremely small-the size of a period produced by a typewriter or even smaller-the stegotext was whatever the dot was hidden within. If a letter or an address, it was some alphabetic characters. If under a postage stamp, it was the presence of the stamp. The problem with the WWII microdots was that they needed to be embedded in the paper, and covered with an adhesive (such as collodion), which could be detected by holding a suspected paper up to a light and viewing it almost edge on. The embedded microdot would reflect light differently than the paper.
  • More obscurely, during World War II, a spy for the Japanese in New York City, Velvalee Dickinson, sent information to accommodation addresses in neutral South America. She was a dealer in dolls, and her letters discussed how many of this or that doll to ship. The stegotext in this case was the doll orders; the 'plaintext' being concealed was itself a codetext giving information about ship movements, etc. Her case became somewhat famous and she became known as the Doll Woman.
  • Possibly even more obscurely, during World War II, another technology used was specially treated paper that would reveal invisible ink. An article in the June 24, 1948 issue of Paper Trade Journal by the Technical Director of the United States Government Printing Office, Morris S. Kantrowitz, describes in general terms the development of this paper, three prototypes of which were named "Sensicoat," "Anilith," and "Coatalith" paper. The purpose was to manufacture postal cards and stationery to be given to German prisoners of war in the U.S. and Canada. If the POWs attempted to write a hidden message the special paper would make it visible. At least two U.S. patents were granted related to this technology, one to Mr. Kantrowitz, No. 2,515,232, "Water-Detecting paper and Water-Detecting Coating Composition Therefor," patented July 18, 1950, and an earlier one, "Moisture-Sensitive Paper and the Manufacture Thereof," No. 2,445,586, patented July 20, 1948.
  • Counter-propaganda: During the Pueblo Incident, US crew members of the USS Pueblo (AGER-2) research ship held as prisoners by North Korea communicated in sign language during staged photo ops to inform the United States that they had not defected, but had instead been captured by North Korea and were still loyal to the U.S. In other photos presented to the US, the crew members gave "the finger" to the unsuspecting North Koreans, in an attempt to discredit the pictures that showed them smiling and comfortable.[4]

Additional terminology[edit]

In general, terminology analogous to (and consistent with) more conventional radio and communications technology is used; however, a brief description of some terms which show up in software specifically, and are easily confused, is appropriate. These are most relevant to digital steganographic systems.

The payload is the data it is desirable to transport (and, therefore, to hide). The carrier is the signal, stream, or data file into which the payload is hidden; contrast "channel" (typically used to refer to the type of input, such as "a JPEG image"). The resulting signal, stream, or data file which has the payload encoded into it is sometimes referred to as the package, stego file, or covert message. The percentage of bytes, samples, or other signal elements which are modified to encode the payload is referred to as the encoding density and is typically expressed as a floating-point number between 0 and 1.

In a set of files, those files considered likely to contain a payload are called suspects. If the suspect was identified through some type of statistical analysis, it may be referred to as a candidate.

Countermeasures and detection[edit]

Detection of physical steganography requires careful physical examination, including the use of magnification, developer chemicals and ultraviolet light. It is a time-consuming process with obvious resource implications, even in countries where large numbers of people are employed to spy on their fellow nationals. However, it is feasible to screen mail of certain suspected individuals or institutions, such as prisons or prisoner-of-war (POW) camps. During World War II, a technology used to ease monitoring of POW mail was specially treated paper that would reveal invisible ink. An article in the June 24, 1948 issue of Paper Trade Journal by the Technical Director of the United States Government Printing Office, Morris S. Kantrowitz, describes in general terms the development of this paper, three prototypes of which were named Sensicoat, Anilith, and Coatalith paper. These were for the manufacture of post cards and stationery to be given to German prisoners of war in the US and Canada. If POWs tried to write a hidden message the special paper would render it visible. At least two US patents were granted related to this technology, one to Mr. Kantrowitz, No. 2,515,232, "Water-Detecting paper and Water-Detecting Coating Composition Therefor", patented July 18, 1950, and an earlier one, "Moisture-Sensitive Paper and the Manufacture Thereof", No. 2,445,586, patented July 20, 1948. A similar strategy is to issue prisoners with writing paper ruled with a water-soluble ink that "runs" when in contact with a water-based invisible ink.

In computing, detection of steganographically encoded packages is called steganalysis. The simplest method to detect modified files, however, is to compare them to known originals. For example, to detect information being moved through the graphics on a website, an analyst can maintain known-clean copies of these materials and compare them against the current contents of the site. The differences, assuming the carrier is the same, will compose the payload. In general, using extremely high compression rate makes steganography difficult, but not impossible. While compression errors provide a hiding place for data, high compression reduces the amount of data available to hide the payload in, raising the encoding density and facilitating easier detection (in the extreme case, even by casual observation).

Steganalysis can have a two-sided approach that involves detecting both artifacts and signatures of known steganography applications. All files on a suspect filesystem can be hashed using a hash function and then compared to a hash table of known steganography applications to show that a particular steganography application is, or was, present on the system at some point in time. The second step in the steganalysis process is to search all files on a suspect filesystem for signatures (uniquely identifiable byte patterns) that act as identifiers that are embedded as a result of hiding the information. A similar approach can be used to scan files over network links in real-time.

Deniable steganography[edit]

There will always be a unnegligible probability of being detected even if your hidden stream behaves like a “natural container” (unpredictable side-effects, you're caught Flagrante delicto, ...). Resisting also these unpredictable attacks is possible, even when you will be enforced (by legal or physical coercion) to provide a valid password.[5][6] Deniable steganography (a decoy based technique) allows to convincingly deny the fact that sensible data is being hidden. You only have to provide some expendable decoy data, that you would plausibly want to keep confidential, and reveal it to the attacker, claiming that this is all there is.

Applications[edit]

Usage in modern printers[edit]

Main article: Printer steganography

Steganography is used by some modern printers, including HP and Xerox brand color laser printers. Tiny yellow dots are added to each page. The dots are barely visible and contain encoded printer serial numbers, as well as date and time stamps.

Example from modern practice[edit]

Image of a tree.
By removing all but the last 2 bits of each color component, an almost completely black image results. Making the resulting image 85 times brighter results in the image below.
Image extracted from above image.

The larger the cover message is (in data content terms—number of bits) relative to the hidden message, the easier it is to hide the latter.

For this reason, digital pictures (which contain large amounts of data) are used to hide messages on the Internet and on other communication media. It is not clear how commonly this is actually done. For example: a 24-bit bitmap will have 8 bits representing each of the three color values (red, green, and blue) at each pixel. If we consider just the blue there will be 28 different values of blue. The difference between 11111111 and 11111110 in the value for blue intensity is likely to be undetectable by the human eye. Therefore, the least significant bit can be used (more or less undetectably) for something else other than color information. If we do it with the green and the red as well we can get one letter of ASCII text for every three pixels.

Stated somewhat more formally, the objective for making steganographic encoding difficult to detect is to ensure that the changes to the carrier (the original signal) due to the injection of the payload (the signal to covertly embed) are visually (and ideally, statistically) negligible; that is to say, the changes are indistinguishable from the noise floor of the carrier.

From an information theoretical point of view, this means that the channel must have more capacity than the 'surface' signal requires, that is, there must be redundancy. For a digital image, this may be noise from the imaging element; for digital audio, it may be noise from recording techniques or amplification equipment. In general, electronics that digitize an analog signal suffer from several noise sources such as thermal noise, flicker noise, and shot noise. This noise provides enough variation in the captured digital information that it can be exploited as a noise cover for hidden data. In addition, lossy compression schemes (such as JPEG) always introduce some error into the decompressed data; it is possible to exploit this for steganographic use as well.

Steganography can be used for digital watermarking, where a message (being simply an identifier) is hidden in an image so that its source can be tracked or verified.

Alleged usage by terrorists[edit]

Template:Inappropriate tone When one considers that messages could be encrypted steganographically in e-mail messages, particularly e-mail spam, the notion of junk e-mail takes on a whole new light. Coupled with the "chaffing and winnowing" technique, a sender could get messages out and cover their tracks all at once.

Rumors about terrorists using steganography started first in the daily newspaper USA Today on February 5, 2001 in two articles titled "Terrorist instructions hidden online" and "Terror groups hide behind Web encryption". In July of the same year, the information looked even more precise: "Militants wire Web with links to jihad".

A citation from the USA Today article: "Lately, al-Qaeda operatives have been sending hundreds of encrypted messages that have been hidden in files on digital photographs on the auction site eBay.com". These rumors were cited many times—without ever showing any actual proof—by other media worldwide, especially after the terrorist attack of 9/11.

For example, the Italian newspaper Corriere della Sera reported that an Al Qaeda cell which had been captured at the Via Quaranta mosque in Milan had pornographic images on their computers, and that these images had been used to hide secret messages (although no other Italian paper ever covered the story).

The USA Today articles were written by veteran foreign correspondent Jack Kelley, who in 2004 was fired after allegations emerged that he had fabricated stories and invented sources.

In October 2001, the New York Times published an article claiming that al-Qaeda had used steganographic techniques to encode messages into images, and then transported these via e-mail and possibly via USENET to prepare and execute the September 11, 2001 Terrorist Attack.

The Federal Plan for Cyber Security and Information Assurance Research and Development[7], published in April 2006 makes the following statements:

  • "…immediate concerns also include the use of cyberspace for covert communications, particularly by terrorists but also by foreign intelligence services; espionage against sensitive but poorly defended data in government and industry systems; subversion by insiders, including vendors and contractors; criminal activity, primarily involving fraud and theft of financial or identity information, by hackers and organized crime groups…" (p 9–10)
  • "International interest in R&D for steganography technologies and their commercialization and application has exploded in recent years. These technologies pose a potential threat to national security. Because steganography secretly embeds additional, and nearly undetectable, information content in digital products, the potential for covert dissemination of malicious software, mobile code, or information is great." (p 41–42)
  • "The threat posed by steganography has been documented in numerous intelligence reports." (p 42)

Moreover, a captured terrorist training manual, the "Technical Mujahid, a Training Manual for Jihadis" contains a section entitled "Covert Communications and Hiding Secrets Inside Images." A brief summary is provided by the Jamestown Foundation [8].

See also[edit]

Article References[edit]

  1. FAP, ({{{year}}}). "Information Hiding: A survey," Proceedings of the IEEE (special issue), 87, 1062-78.
  2. Pahati, OJ Confounding Carnivore: How to Protect Your Online Privacy. AlterNet. Archived from source 2007-07-16. URL accessed on 2008-09-02.
  3. The origin of Modern Steganography
  4. CTO Sea Dogs
  5. Greg S. Sergienko - Legal Coercion
  6. Julian Assange - Physical Coercion
  7. CSIA12i-FINAL.qxd
  8. The Jamestown Foundation

References[edit]

  • Wayner, Peter (2002). Disappearing cryptography: information hiding: steganography & watermarking, Amsterdam: MK/Morgan Kaufmann Publishers.
  • Petitcolas, Fabian A.P.; Katzenbeisser, Stefan (2000). Information Hiding Techniques for Steganography and Digital Watermarking, Artech House Publishers.
  • Johnson, Neil; Duric, Zoran; Jajodia, Sushil (2001). Information hiding: steganography and watermarking: attacks and countermeasures, Springer.
  • GC, ({{{year}}}). "An Overview of Steganography for the Computer Forensics Examiner," Forensic Science Communications, 6, .
  • C, (1996). "Covert Channels in the TCP/IP Suite," First Monday, 2, .


Further reading[edit]

External links[edit]

Steganalysis[edit]

  • Steganalysis papers on attacks against Steganography, Watermarking and Countermeasures to these attacks.
  • Cyber warfare: steganography vs. steganalysis For every clever method and tool being developed to hide information in multimedia data, an equal number of clever methods and tools are being developed to detect and reveal its secrets.
  • "Detecting Steganographic Content on the Internet", PDF file, 813 KB.
  • Some sample pages of Gaspar Schott's Schola steganographica
  • Research Group An example of ongoing research on Steganography.
  • StegDetect A tool to automatically find hidden messages in images embedded by seven steganography applications.
  • StegSpy A tool that will detect hidden messages embedded by five steganography applications
  • Analyzing steganography applications: Practical examples on how some steganography software works, and how many of them are crackable.
  • StegSecret: StegSecret is a java-based multiplatform steganalysis tool. This tool allows the detection of hidden information by using the most known steganographic methods. It detects EOF, LSB, DCTs and other techniques. (steganography - stegoanalysis).

Implementations[edit]

Online (Hiding text)[edit]

  • mozaiq Has a large library of stock photos it provides if you can't supply a photo of your own. A good starting point for creating simple steganographic examples.
  • spammimic.com will take a sentence that you provide and turn it into text that looks to all the world like spam.
  • Hide text in a PNG or BMP image and its corresponding decoder.

Online (Hiding files)[edit]


Downloadable (Hiding text)[edit]

  • "Integer Binary Numbers" Freeware Code and decode MsOffice, OpenOffice files in bmp file. You can secure your document with a password.
  • Concealar ...coz a picture speaks a thousand words! The software "Concealar" hides text into images & pictures by a password using cryptographic and steganographic techniques. Encryption algorithm used for text is AES (Rijndael) and the password is hashed with SHA512. The software does not create any noise in the resultant image so pattern-finding & pixel-mapping techniques of steganalysis don't work on this software.
  • Bapuli Online—implementing steganography using Visual Basic.
  • BitCrypt is one of the easiest to use encryption tools which at the same time provide ultra-strong encryption. It uses up to 8192 long bit key ciphers to encrypt the text, and then stores the encrypted text within bitmap images.
  • Hackito Ergo Sum Blog Hide text in a PNG image and read it back. Includes open source code and a complete explanation of the process.

Downloadable (Hiding files)[edit]

  • OpenPuff Multilayered data obfuscation, deniable steganography, non-linear covering function. Free and suitable for highly sensitive data covert transmission.
  • Hiding Glyph: Bytewise Image Steganography: Hides any file (or folder) into any losslessly compressed image (BMP, PNG, etc…). (freeware)
  • "Integer Binary Numbers" Freeware Code and decode MsOffice, OpenOffice files in bmp file. You can secure your document with a password.
  • BestCrypt Commercial Windows/Linux disk encryption software that supports hiding one encrypted volume inside another
  • Crypto-Stego Utility for the Zillions of Games program.
  • Digital Invisible Ink Toolkit An open-source cross-platform image steganography suite that includes both steganography and steganalysis implementations.
  • FreeOTFE Free, open-source Windows/PocketPC/Linux disk encryption software that supports hiding one encrypted volume inside another, without leaving any evidence that the second encrypted volume exists. This probably resists any statistical analysis (as opposed to tools that conceal data within images or sound files, which is relatively easy to detect).
  • MP3 Steganographic File System, a description of an approach to create a file system which is implemented over MP3 files.
  • OpenStego OpenStego is an opensource (GPL) program/library for embedding any type of file into images. Currently, it is written in Java, and supports 24 bpp images.
  • OutGuess A steganography application to find data in Jpeg images.
  • PCopy A steganography commandline tool with a userfriendly wizard which can produce lossless images like PNG and BMP. Special features are RLE, Huffman compression, strong XOR encryption and the Hive archiving format which enables the injection of entire directories.
  • Phonebook FS protects your disks with Deniable Encryption
  • stego and winstego Steganography by justified plain text.
  • Stego-0.5, a GNOME/GTK+ based GUI for LSB algorithm. License (GPL)
  • Stego Archive Source for a large variety of steganography software.
  • Steghide Free .jpeg and .wav encryption for Linux and other operating systems.
  • SteGUI Free GUI for Steghide for Linux.
  • Thumbnail Steganography is a new type of steganography designed to increase the complexity required when attempting to automate steganography detection. It requires the original image (jpg, gif, etc) as well as the thumbnail (png) to extract the file from the thumbnail. It is open source and written in java.
  • TrueCrypt Free, open-source Windows/Linux disk encryption software that supports hiding one encrypted volume inside another, without leaving any evidence that the second encrypted volume exists. This probably resists any statistical analysis (as opposed to tools that conceal data within images or sound files, which is relatively easy to detect).
  • Peter Wayner's website—sample implementations of steganographic techniques, by the author of Disappearing Cryptography.
  • NetTools Steganography by hiding data in pictures, archives, sounds, text files, html, and lists.
  • Qtech Hide & View v.01 is the newest BPCS-Steganography program for Windows. This is an image steganography. (Free to use)
  • SteganoG a simple program to hide a text file in a .bmp file.
  • Downloadable hideimage—Image hider, also available in a PHP Interface. No licensing at all.

Template:Crypto navbox Template:Espionage Template:intelligence cycle management