SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Technology Stocks : The *NEW* Frank Coluccio Technology Forum

 Public ReplyPrvt ReplyMark as Last ReadFilePrevious 10Next 10PreviousNext  
To: ftth who started this subject9/29/2001 10:04:00 PM
From: Frank A. Coluccio   of 46821
 
Steganography...

Coded Communications

Did the hijackers hide their messages in harmless-looking images on the Internet?

msnbc.com

By Peter McGrath
NEWSWEEK WEB EXCLUSIVE

Sept. 21 — In his history of the Persian Wars, Herodotus tells of a messenger who shaved his head and allowed a secret message to be tattooed on his scalp. He waited until his hair grew back. Then he journeyed to where the recipient awaited him and shaved his head again. The message was revealed. It was history’s first use of steganography.
















IN TODAY’S digital world, steganography-from the Greek for “covered writing”-has become a popular form of encryption. Traditional ciphers give themselves away because they appear to be gibberish, and anyone who intercepts them will at least have reason to suspect the sender’s motives. But steganography hides the message inside an ordinary-looking objects such as a digitized photo or sound file. It is “visible” only to someone who knows it’s there. Thus, photo agencies use it to create digital “watermarks” for their pictures. The U.S. Customs Service has warned that some Web sites use it to mask pornographic images. And now, many federal investigators believe, some of the terrorists used it to coordinate their attacks on New York and Washington. “Since I’m in the [computer-] security field and therefore a paranoid sort,” says Neil F. Johnson, a steganography specialist at George Mason University in northern Virginia, “I’d expect it to have been used.”



Digital images are good vehicles for steganography. All images contain redundant data: information as to color, for example, that is present but unnecessary for the picture to be seen and understood. This enables the senders of a secret message to substitute digitized text for some of the redundant pixels in a photo, for example. Or it could be a verbal message; when transmitting information, computers treat sound, image and text files all the same. They are all parts of bitstreams.




The senders can then post the result on a public Web site, with only the intended recipients knowing of its existence. A message about which California-bound plane to board in Boston could, for example, be inserted into a picture of a football game at Ohio State. Who would suspect?

The technology will appeal to terrorists because it’s both low cost and relatively easy to use. “You don’t have to be sophisticated,” says Johnson, “and there are tools readily available on the Internet. It’s just download and run.” Browsing any of the well-known download sites like CNET.com will turn up a number of “stego” files for less than $50. The well-reviewed program called Cloak is shareware priced at $30.




The U.S. government is worried enough about terrorists’ use of steganography to have commissioned research on countermeasures. Under contract from the Air Force, for example, WetStone Technologies in Corning, N.Y., is developing algorithms for detecting the existence of embedded messages in digital files. Another—though more primitive—method is to monitor closely Internet images that might match a terrorist’s interests, such as photos of the White House or the New York Stock Exchange. Some steganographic compression techniques, for example, produce noticeable shifts in the color palette. “All existing stego tools and technologies require some modification of the medium,” says Johnson. “The changes made may create anomalies.” Just as if the ancient runner’s hair had grown back white instead of black.
Report TOU ViolationShare This Post
 Public ReplyPrvt ReplyMark as Last ReadFilePrevious 10Next 10PreviousNext