Вы находитесь на странице: 1из 48

Steganography

Theartofsecretwritingfor espionage,identificationof copyrightandotherapplications.

Acrostics1.

Basicfingerprints,whichemploy lettersinparticularpositions orsequences,arefairlyeasyto generateifacomputerisusedasa guidetoprovideanappropriate setofwords.

Acrostics2.

Fingerprintingisnotadifficultjob providedeither,thatthereareseveral waysofarrangingasentenceinorderto expressthemeaningor,thatbychoosing aflexiblemethodforthefingerprinting itispossibletochoosemanyvariations.

Acrostics3.
Fingerprintingisnotadifficultjob providedeither,thatthereareseveral waysofarrangingasentenceinorderto expressthemeaningor,thatbychoosing aflexiblemethodforthefingerprinting itispossibletochoosemanyvariations

Acrostics4.

Statisticallyspeakingthereisnodoubt thatafingerprint,whichissuitably long,providesproofofidentification forallpracticalpurposes,although additionaloccurenceswithinamessage shouldconvinceascepticalidealist.

Acrostics5.
Abasicproblemwhenselecting algorithmsprogrammedtoagreewith instructionsforspatialpositioning,is thattheyarevulnerabletoreformating onawordprocessor.

Acrostics5a.
Abasicproblemwhenselecting algorithmsprogrammedtoagreewith instructionsforspatialpositioning,is thattheyarevulnerabletoreformating onawordprocessor.

Acrostics6.(10columnblock)
B L O G G S F A L E R R R T O B A S E M W C T I I T H A M M E E W R U C R S P I H N M E I T A C E G S D T I T P N A P T H O I R S L R O I N A

Acrostics6a.(9columnblock)
A B E L P D I C S B A S I L E M W L E C T G O R I R O G R T O A G T H I N T I O N P A T I C P R H E N I N G T H M A M M R E E S T R S F O A L

Earlyexamples.
TheCodebreakersDavidKahn. In500BC,slavewassentbyPersian courtierurgingcollaboratortorevolt. Waxtablet; Invisibleink; dotsovertext; fullstopusinganilynedye.

ExamplesofCensorship
Censorsrestricted: Chessgames, Crosswordpuzzles, Newspapercuttings(dottedwithinvisible ink?)

Censorsproblems.
Loosestampswereremovedandreplaced byothersofequaldenomination. Listofknittinginstructionswasheldup whileexaminerknittedsweater.

Hiddenmeanings.
EGofonecablegramwhichstated"Father isdead". Censorreplaceditwith"Fatheris deceased". Replycameback:"Isfatherdeador deceased?"

Flowersontree.

Distributionofflowers ontreeusedto encodedigital message.


From "SecurityforComputer Networks" D.W.Davies&W.Price

FromGreattruespystoriesAllenDulles.

"AblackpetticoatonAnnaStrong'sclothesline acrossthebaywouldtellhimthatCalab Brewsterhadarrived,&thenumberof handkerchiefshangingbesideitwoulddirect himtotheparticularcavewherethewhaleboat washidden."

Copyright&Credibility.

Credibilityofconcealedinformation.

CredibilityvObscurity.

Ofconcealedcopyrightinformation. Needtopreventinfringerremovingit. Sohastobehiddenandperhapsencrypted. Butiftooobscurethenmaylosecredibility.

Credibilityvcomplexity.

Obviousorobscure?

Securityvcomplexity.

Secureorobvious?

Utility.

Compromisebetween credibilityandsecurity. Utility= CredibilityXSecurity.

Spatialpositioning.

DigitalImages.
"WatermarkingDigitalImagesforCopyright Protection."
BolandFM,O'Ruanaidh&DautzenbergC. TrinityCollegeDublinandRheinischWestfaelische TechnischeHochschule,Aachen.

HidingindigitalImages.
l.s.b.ofpixelschosentoencodemessage. Messagemightalsobeencrypted. Pixelscanbechosenpseudorandomly. Busypartofpicturebestforhiding. Problemiflossycompressionisused. Spatialspreadspectrummayhelp.

Digitalimages(Bolandetal).

Counterstodatahiding.
Removel.s.b. Detectionofunusualspatialfrequency spectrum. Useofcommercialstegsoftwarehelps analysis. Stirmarkattackdistortsimage. Jitterattackshiftsblocksimperceptively. Mosaicattacksplittingintosubimages.

Computerbased Steganography.
Howitworksandwhythereforeanyrestrictions oncryptographyarenonsense,atbest."

"ComputerbasedSteganography:

FranzE.,MollerS.etal UniversitiesofDresdenandHildesheim

Digitalspeech&music.
Soundrepresentedasasequenceofdigital codehassimilarhidingpropertiestoimages. Frequentmodificationssoundnoisy. Necessarytohidemessageinhighvolume sound. Asilentpassageisequivalenttoblueskyin animage.

Digitalspeech&music.
Perceptionofmodificationsdependson strengthofsignal&rateofmodification. Bit spacing Bigroom,littlebackgroundnoise.63 Countryside,muchbackgroundnoise.7 Countryside,littlebackgroundnoise.15 Telephoneboxinaquietarea.15

Digitalspeech&music.
Inanoisyenvironmenteach8thbitcould bechangedgivingatransmissionrateof 2750bitspersecond. Inaquietenvironmentitwasonlypossible tochangeeach128thbitlimitingthe transmissionto170bitspersecond.

Echo1

Echo2

Applicationsofechomethod.
Computermonitoringtorecordwhen copyrightmaterialisbroadcast. Tocheckthatadvertisingmaterialhasbeen broadcasttherequisitenumberoftimes. Webcrawlerstocheckonsoundbites distributedovertheInternet. Identificationoftelephonecallers.

FractalSystems
"FractalBasedImageSteganography."
ScottM.andDavernP. DublinCityUniversityandCarlowRegional TechnicalCollege.

Fractalcoding(Scott&Davern).

Twosetsofdomainblocksarechosen. Mappingthesecretmessageontorangeblocks isbychoosingfromthedomainsthat correspondtoa"1"or"0". Imageiscompressedandshouldnotsuffer furthercompressionproblem.

Fractalcoding(Scott&Davern).

Hiddendatachannels.

HidingDataintheOSInetworkmodel. TGHandel&MSandford
LosAlomosNationalLaboratory.

Hiddendatachannels.

Covertchannelsinnetworkprotocol.
EgtogglingCTSandRTShandshake. UnusedfieldsinInternetpacketheader. Sequenceoflegitimatemessages. Timingofcontentionbetweenservices.

Plausibledeniability.
"Thesteganographicfilesystem" RAnderson,RNeedham,AShamir. "AsteganographicfilesystemforLinux" AMcDonald&MKuhn. Cambridge. Multiplefilessystems Onetimepads

Onetimepadmethods.
Thesecurityproblem. Useofirrationalnumbersforpseudo randomnumberkeys. e.g.Squarerootd=6.1=2.469817807...... Sq.root(n*d+c)

ShakespeareBacondebate.
TDBokenhamformerlychairman oftheFrancisBaconsociety. "TheSixtyseventhInquisition" "ABriefhistoryoftheBacon Shakespearecontroversy"

TDBokenham
WH A T T H E Y H A U E ME S & I NCENCEO K E I T UUAS NOF A N D T H E MO S T T H O O U S WH E N T H E Y A O S T H UMB L Y CON T SHAKESPEARE

Shakespeare'stombstone inscription(fromTDBokenham)

TextfromTheTempest.

Thecloudcappedtow'rs,thegorgeouspalaces, Thesolemntemples,thegreatglobeitself, Yea,allwhichitinherit,shalldissolve, Andlikethisinsubstantialpageantfaded, Leavenotarackbehind. TheCloudcuptTowrs. TheGorgeousPalaces, TheSolemnTemples, TheGreatGlobeitfelf, Yea,allwhichitInherit, ShallDifsolve; AndlikethebafelefsFnbrickofaUifiar, Leavenotawrackbehind.

Bokenhamscalculations.

"Count"ofanameissumoflettersbasedon a=1,b=2etc 1stsixlinescontain103letters(countof Shakespeare) Lastthreelineshave67letters(countof Francis) "Shalldifsolveisisolatedandis13characters long.

Anagramontombstone.
FNB I.N R.C C.O S.H A.A

Misusesofsteganography.
OtherNumerousattemptsto"prove" FrancisBaconwrotetheShakespeare plays. "Anagrammaticacrostics"byWalter Arensberg 200+character"anagrams"byArthur Cornwall.

Misusesofsteganography.
"Biblecodes"derivedfromacrosticswith verylargeskipdistances. SimilaranalysisofMobyDickalso notionallyforecastdeathsofPresident KennedyandPrincessDiana,andmany othersituations.

Вам также может понравиться