Professional Documents
Culture Documents
Steganography: The Art of Secret Writing For Espionage, Identification of
Steganography: The Art of Secret Writing For Espionage, Identification of
Acrostics1.
Acrostics2.
Acrostics3.
Fingerprintingisnotadifficultjob providedeither,thatthereareseveral waysofarrangingasentenceinorderto expressthemeaningor,thatbychoosing aflexiblemethodforthefingerprinting itispossibletochoosemanyvariations
Acrostics4.
Acrostics5.
Abasicproblemwhenselecting algorithmsprogrammedtoagreewith instructionsforspatialpositioning,is thattheyarevulnerabletoreformating onawordprocessor.
Acrostics5a.
Abasicproblemwhenselecting algorithmsprogrammedtoagreewith instructionsforspatialpositioning,is thattheyarevulnerabletoreformating onawordprocessor.
Acrostics6.(10columnblock)
B L O G G S F A L E R R R T O B A S E M W C T I I T H A M M E E W R U C R S P I H N M E I T A C E G S D T I T P N A P T H O I R S L R O I N A
Acrostics6a.(9columnblock)
A B E L P D I C S B A S I L E M W L E C T G O R I R O G R T O A G T H I N T I O N P A T I C P R H E N I N G T H M A M M R E E S T R S F O A L
Earlyexamples.
TheCodebreakersDavidKahn. In500BC,slavewassentbyPersian courtierurgingcollaboratortorevolt. Waxtablet; Invisibleink; dotsovertext; fullstopusinganilynedye.
ExamplesofCensorship
Censorsrestricted: Chessgames, Crosswordpuzzles, Newspapercuttings(dottedwithinvisible ink?)
Censorsproblems.
Loosestampswereremovedandreplaced byothersofequaldenomination. Listofknittinginstructionswasheldup whileexaminerknittedsweater.
Hiddenmeanings.
EGofonecablegramwhichstated"Father isdead". Censorreplaceditwith"Fatheris deceased". Replycameback:"Isfatherdeador deceased?"
Flowersontree.
FromGreattruespystoriesAllenDulles.
Copyright&Credibility.
Credibilityofconcealedinformation.
CredibilityvObscurity.
Credibilityvcomplexity.
Obviousorobscure?
Securityvcomplexity.
Secureorobvious?
Utility.
Spatialpositioning.
DigitalImages.
"WatermarkingDigitalImagesforCopyright Protection."
BolandFM,O'Ruanaidh&DautzenbergC. TrinityCollegeDublinandRheinischWestfaelische TechnischeHochschule,Aachen.
HidingindigitalImages.
l.s.b.ofpixelschosentoencodemessage. Messagemightalsobeencrypted. Pixelscanbechosenpseudorandomly. Busypartofpicturebestforhiding. Problemiflossycompressionisused. Spatialspreadspectrummayhelp.
Digitalimages(Bolandetal).
Counterstodatahiding.
Removel.s.b. Detectionofunusualspatialfrequency spectrum. Useofcommercialstegsoftwarehelps analysis. Stirmarkattackdistortsimage. Jitterattackshiftsblocksimperceptively. Mosaicattacksplittingintosubimages.
Computerbased Steganography.
Howitworksandwhythereforeanyrestrictions oncryptographyarenonsense,atbest."
"ComputerbasedSteganography:
FranzE.,MollerS.etal UniversitiesofDresdenandHildesheim
Digitalspeech&music.
Soundrepresentedasasequenceofdigital codehassimilarhidingpropertiestoimages. Frequentmodificationssoundnoisy. Necessarytohidemessageinhighvolume sound. Asilentpassageisequivalenttoblueskyin animage.
Digitalspeech&music.
Perceptionofmodificationsdependson strengthofsignal&rateofmodification. Bit spacing Bigroom,littlebackgroundnoise.63 Countryside,muchbackgroundnoise.7 Countryside,littlebackgroundnoise.15 Telephoneboxinaquietarea.15
Digitalspeech&music.
Inanoisyenvironmenteach8thbitcould bechangedgivingatransmissionrateof 2750bitspersecond. Inaquietenvironmentitwasonlypossible tochangeeach128thbitlimitingthe transmissionto170bitspersecond.
Echo1
Echo2
Applicationsofechomethod.
Computermonitoringtorecordwhen copyrightmaterialisbroadcast. Tocheckthatadvertisingmaterialhasbeen broadcasttherequisitenumberoftimes. Webcrawlerstocheckonsoundbites distributedovertheInternet. Identificationoftelephonecallers.
FractalSystems
"FractalBasedImageSteganography."
ScottM.andDavernP. DublinCityUniversityandCarlowRegional TechnicalCollege.
Fractalcoding(Scott&Davern).
Fractalcoding(Scott&Davern).
Hiddendatachannels.
HidingDataintheOSInetworkmodel. TGHandel&MSandford
LosAlomosNationalLaboratory.
Hiddendatachannels.
Covertchannelsinnetworkprotocol.
EgtogglingCTSandRTShandshake. UnusedfieldsinInternetpacketheader. Sequenceoflegitimatemessages. Timingofcontentionbetweenservices.
Plausibledeniability.
"Thesteganographicfilesystem" RAnderson,RNeedham,AShamir. "AsteganographicfilesystemforLinux" AMcDonald&MKuhn. Cambridge. Multiplefilessystems Onetimepads
Onetimepadmethods.
Thesecurityproblem. Useofirrationalnumbersforpseudo randomnumberkeys. e.g.Squarerootd=6.1=2.469817807...... Sq.root(n*d+c)
ShakespeareBacondebate.
TDBokenhamformerlychairman oftheFrancisBaconsociety. "TheSixtyseventhInquisition" "ABriefhistoryoftheBacon Shakespearecontroversy"
TDBokenham
WH A T T H E Y H A U E ME S & I NCENCEO K E I T UUAS NOF A N D T H E MO S T T H O O U S WH E N T H E Y A O S T H UMB L Y CON T SHAKESPEARE
Shakespeare'stombstone inscription(fromTDBokenham)
TextfromTheTempest.
Thecloudcappedtow'rs,thegorgeouspalaces, Thesolemntemples,thegreatglobeitself, Yea,allwhichitinherit,shalldissolve, Andlikethisinsubstantialpageantfaded, Leavenotarackbehind. TheCloudcuptTowrs. TheGorgeousPalaces, TheSolemnTemples, TheGreatGlobeitfelf, Yea,allwhichitInherit, ShallDifsolve; AndlikethebafelefsFnbrickofaUifiar, Leavenotawrackbehind.
Bokenhamscalculations.
Anagramontombstone.
FNB I.N R.C C.O S.H A.A
Misusesofsteganography.
OtherNumerousattemptsto"prove" FrancisBaconwrotetheShakespeare plays. "Anagrammaticacrostics"byWalter Arensberg 200+character"anagrams"byArthur Cornwall.
Misusesofsteganography.
"Biblecodes"derivedfromacrosticswith verylargeskipdistances. SimilaranalysisofMobyDickalso notionallyforecastdeathsofPresident KennedyandPrincessDiana,andmany othersituations.