Democratic Underground Latest Greatest Lobby Journals Search Options Help Login
Google

Steganography - Hiding a secret message inside an innocent-looking message

Printer-friendly format Printer-friendly format
Printer-friendly format Email this thread to a friend
Printer-friendly format Bookmark this thread
This topic is archived.
Home » Discuss » Archives » General Discussion (01/01/06 through 01/22/2007) Donate to DU
 
StefanX Donating Member (801 posts) Send PM | Profile | Ignore Tue Dec-27-05 08:02 PM
Original message
Steganography - Hiding a secret message inside an innocent-looking message
Edited on Tue Dec-27-05 08:09 PM by StefanX
"Steganography" is the practice of embedding a secret message inside another, innocent-looking message -- thereby hiding the fact that communication is even taking place.

Why am I mentioning this now? Oh, I don't know... thought it could be interesting. While Georgie Boy and the NSA spend billions of dollars breaking the law and snooping into the emails and phone calls of every American citizen, we can rest assured that the Bad Guys can continue to communicate "under the radar" using the latest steganography software.



Below are some examples of steganography programs. Some of them are free. Try the demo on the first one listed below -- SPAM MIMIC -- it takes your super-secret message and converts it into an annoying (but innocent-looking) piece of spam!

=====

http://www.spammimic.com/

There are terrific tools (like PGP and GPG) for encrypting your mail. If somebody along the way looks at the mail they can't understand it. But they do know you are sending encrypted mail to your pal.

The answer: encode your message into something innocent-looking.

Your messages will be safe and nobody will know they're encrypted!

There's a demo on this site you can try out. Type in your secret message -- click ENCODE -- and your message will turn into innocent-looking spam! Click DECODE and the spam will turn back into your original message.

=====

http://www.invisiblesecrets.com/hide-files.html

"Hide files in five innocent looking files types: JPEG, PNG, BMP, HTML and WAV. To encrypt and hide files in a carrier file you can use the wizard which will guide you step-by-step through the process."

=====

http://www.steganos.com/?content=products_sss&command=features&feature=steganography

"Secret data is enbedded in BMPs or WAVs. You see and hear no difference."

=====

http://steghide.sourceforge.net/

Steghide: (open-source) "Steghide is a steganography program that is able to hide data in various kinds of image- and audio-files. The color- respectivly sample-frequencies are not changed thus making the embedding resistant against first-order statistical tests."

====

If Georgie Boy couldn't detect the message "Bin Laden Determined to Strike Inside US" printed in bold capital letters on his August 6 Presidential Daily Brief, ya think he'll be able to spot the secret message embedded (using White Noise Storm) in one of these pictures of William Shakespeare?



=====

Some articles on Steganography:

http://plus.maths.org/issue21/features/singh/
"I could send you send you a JPEG, a picture of my trip to Australia on holiday, but hidden in that picture, hidden in the digital information, would be a message."

http://www.wired.com/news/politics/0,1283,41658,00.html
The technique, known as steganography, is the practice of embedding secret messages in other messages -- in a way that prevents an observer from learning that anything unusual is taking place.
Printer Friendly | Permalink |  | Top
Berry Cool Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Dec-27-05 08:06 PM
Response to Original message
1. This is hardly news.
I used to work for an institution that employed a steganography expert. I haven't worked for that institution for a year and a half.

Surely someone working for Georgie Boy is aware of this stuff too.

One of the biggest uses for steganography experts is in attempting to decode seemingly innocent images with hidden messages embedded in them.
Printer Friendly | Permalink |  | Top
 
hwmnbn Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Dec-27-05 08:14 PM
Response to Reply #1
3. It's news to me......
Maybe it's not news to the CIA either but....

They were not aware of removing their cell-phone batteries when they did their rendition in Italy. Those cell-phone records tracked and identified all of them. They weren't aware of THAT. :rofl:

I just thought this program was cool. I have no immediate plans to use it however. Did you get that, agent Mike?
Printer Friendly | Permalink |  | Top
 
StefanX Donating Member (801 posts) Send PM | Profile | Ignore Tue Dec-27-05 08:14 PM
Response to Reply #1
4. Yes, there are steganalysis techniques
which attempt to figure out if an innocent picture or audio clip is actually harboring the secret message "Operation Quagmire Begins At Dawn."

Do you think that if the Georgie and the NSA intercept EVERY SINGLE MESSAGE SENT IN THE WORLD they'll be able to (1) figure out which ones actually contain secret messages and (2) decode those messages?

I doubt it. There's an ocean of stuff out there to look at -- and the problem gets harder if you have to try to decrypt every innocent-looking vacation picture, and every innocent-sounding audio-clip.

But, while the terrorists continue to communicate under the radar, I bet Bush and his minions are having a had a great time listening in on every phone call Cindy Sheehan or Joseph Wilson or John Kerry make!
Printer Friendly | Permalink |  | Top
 
wakeme2008 Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Dec-27-05 08:10 PM
Response to Original message
2. Tinfoil Hat time warning...
The only one I would trust is the one from sourceforge with SOURCE.

Do you really know who the other people are.... :tinfoilhat:
Printer Friendly | Permalink |  | Top
 
StefanX Donating Member (801 posts) Send PM | Profile | Ignore Tue Dec-27-05 08:15 PM
Response to Reply #2
5. Very good point!
I'm a Linux user myself.

Printer Friendly | Permalink |  | Top
 
agincourt Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Dec-27-05 08:18 PM
Response to Original message
6. Real terrorists wouldn't heavily use land lines.
They would use this technology or even something as simple as runners. We would probably be shocked if we knew what the Bush administration was really phone-taping for.
Printer Friendly | Permalink |  | Top
 
depakid Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Dec-27-05 08:24 PM
Response to Original message
7. Real terrorists wouldn't draw attention to themselves
They'd try to hide in plain sight.

The NSA can't accurately filter though the massive amount of communications in the US or abroad, even with their computing power. People familiar with information theory will know why.

They need all sorts of algorithms to sort out what to look for and where to look. My guess is that encrypted messages (like those using PGP or steganography programs) would be one of the first places they'd start.

Printer Friendly | Permalink |  | Top
 
HysteryDiagnosis Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Dec-27-05 08:42 PM
Response to Reply #7
8. Lets make it a little more interesting. Suppose a site, had a jpeg
that was nothing more than a jpeg.... and that at 12:33 each day, that jpeg was replace by an encoded jpeg for FIVE minutes or less. A person who needs the message downloads the jpeg at 12:34 and at 12:38 the picture reverts back to the plain jane version. Imagine if they are "that" smart... if so there is no way the feds can keep up with this sort of thing... NO WAY.
Printer Friendly | Permalink |  | Top
 
depakid Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Dec-27-05 09:15 PM
Response to Reply #8
12. You might be able to detect a pattern there
The key word is might.

The only way you'd be able to hone in with an algorithm is through plain, old fashioned "gumshoe" intelligence gathering. Same with telephone calls.
Printer Friendly | Permalink |  | Top
 
HysteryDiagnosis Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Dec-28-05 06:39 AM
Response to Reply #12
13. Not if the jpeg "change time" changes by a predetermined "random"
amount each day.
Printer Friendly | Permalink |  | Top
 
StefanX Donating Member (801 posts) Send PM | Profile | Ignore Thu Dec-29-05 07:54 PM
Response to Reply #13
14. I think swapping the real and the doctored jpeg would be worse
If it's just one jpeg, it's less suspicious. Two alternating jpegs, even for just a brief time, would create a suspicious pattern ("grab all websites where the content changed")... and if you had the plain jpeg and the jpeg containing the message, then you could just subtract the two and be left with the (coded) messge.

I think the advantage of steganography is just flooding them with too many decoys and distractions, so there's too big of an ocean of information to sift through -- and everything basically says "Nothing interesting here... Keep moving!"

Remember, that technique gets used against US a lot. It seems pretty effective. Sometimes I think that we're being constantly flooded with distractions and decoys to throw us off from the real shit going down. This seems like a very powerful tactic. If so, everyone can use it.

Printer Friendly | Permalink |  | Top
 
catnhatnh Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Dec-27-05 08:45 PM
Response to Original message
9. Thanks for the info....
....but I'll hide nothing.I'm too old and tired to be duplicious and if what I say is sedition, then let them try my treasonous old ass....Bite me George...
Printer Friendly | Permalink |  | Top
 
AnnieBW Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Dec-27-05 08:47 PM
Response to Original message
10. Poor Man's Steg
And then there's "poor man's steganography", which is simply embedding messages in web pages by putting them in HTML source code, or in the same color as the web page background. See http://marvincandle.com/ and http://www.oceanic-air.com/ for good non-political examples. Those ABC webmasters for "LOST" have waaaay too much time on their hands.
Printer Friendly | Permalink |  | Top
 
iamahaingttta Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Dec-27-05 08:47 PM
Response to Original message
11. I know people who do that kind of thing...
I will often say ass the ass and nobody knows what it means.
Don't ask me, cause I won't tell you!
Printer Friendly | Permalink |  | Top
 
KamaAina Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Dec-29-05 08:04 PM
Response to Original message
15. Steganography was featured in the movie "Along Came a Spider"
with Morgan Freeman. Two KIDS were using it to pass notes back and forth in class, for crying out loud!

Find the coded message in this one:



Stare blankly at it for a few seconds, like it was a Magic Eye. It says, "Bush** is a soulless Nazi who wouldn't lift a finger to help his own people if they happened to be the wrong color."
Printer Friendly | Permalink |  | Top
 
Wizard777 Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Dec-29-05 09:31 PM
Response to Original message
16. Standing infront of the picture. It's in the right eye.
Then there is the Call Intercept between Mohammad Atta and an Al Qaida operative in the Middle East. "Stick stick dash cake with a stick down." Bad pilot? No! 11-9 or 9-11.

The Bible Code is also a form of steganography. That says the WMD's are in Lebanon. Look out Syria here we come!
Printer Friendly | Permalink |  | Top
 
Liberal In Texas Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Dec-29-05 10:25 PM
Response to Original message
17. Cool. (spammimic message follows...)
Dear E-Commerce professional ; This letter was specially
selected to be sent to you . This is a one time mailing
there is no need to request removal if you won't want
any more . This mail is being sent in compliance with
Senate bill 1626 , Title 6 ; Section 302 . Do NOT confuse
us with Internet scam artists . Why work for somebody
else when you can become rich inside 93 MONTHS ! Have
you ever noticed most everyone has a cellphone plus
people love convenience ! Well, now is your chance
to capitalize on this ! WE will help YOU SELL MORE
plus use credit cards on your website ! You can begin
at absolutely no cost to you . But don't believe us
. Ms Jones who resides in Mississippi tried us and
says "I was skeptical but it worked for me" . We assure
you that we operate within all applicable laws ! Don't
delay - order today . Sign up a friend and your friend
will be rich too . Thank-you for your serious consideration
of our offer . Dear Colleague ; You made the right
decision when you signed up for our club ! This is
a one time mailing there is no need to request removal
if you won't want any more ! This mail is being sent
in compliance with Senate bill 1625 ; Title 7 , Section
301 ! This is a ligitimate business proposal ! Why
work for somebody else when you can become rich in
97 days ! Have you ever noticed people are much more
likely to BUY with a credit card than cash and more
people than ever are surfing the web ! Well, now is
your chance to capitalize on this ! WE will help YOU
increase customer response by 170% and sell more .
You can begin at absolutely no cost to you ! But don't
believe us . Mr Jones of Alabama tried us and says
"My only problem now is where to park all my cars"
! We are a BBB member in good standing . We IMPLORE
you - act now . Sign up a friend and you get half off
! Cheers . Dear Web surfer , You made the right decision
when you signed up for our club ! If you are not interested
in our publications and wish to be removed from our
lists, simply do NOT respond and ignore this mail !
This mail is being sent in compliance with Senate bill
1621 , Title 3 ; Section 302 . This is different than
anything else you've seen ! Why work for somebody else
when you can become rich as few as 60 days . Have you
ever noticed people love convenience and people love
convenience ! Well, now is your chance to capitalize
on this ! WE will help YOU SELL MORE & deliver goods
right to the customer's doorstep . The best thing about
our system is that it is absolutely risk free for you
. But don't believe us . Prof Simpson of Delaware tried
us and says "My only problem now is where to park all
my cars" ! This offer is 100% legal . We implore you
- act now ! Sign up a friend and you get half off !
God Bless !
Printer Friendly | Permalink |  | Top
 
DU AdBot (1000+ posts) Click to send private message to this author Click to view 
this author's profile Click to add 
this author to your buddy list Click to add 
this author to your Ignore list Thu Apr 25th 2024, 04:27 AM
Response to Original message
Advertisements [?]
 Top

Home » Discuss » Archives » General Discussion (01/01/06 through 01/22/2007) Donate to DU

Powered by DCForum+ Version 1.1 Copyright 1997-2002 DCScripts.com
Software has been extensively modified by the DU administrators


Important Notices: By participating on this discussion board, visitors agree to abide by the rules outlined on our Rules page. Messages posted on the Democratic Underground Discussion Forums are the opinions of the individuals who post them, and do not necessarily represent the opinions of Democratic Underground, LLC.

Home  |  Discussion Forums  |  Journals |  Store  |  Donate

About DU  |  Contact Us  |  Privacy Policy

Got a message for Democratic Underground? Click here to send us a message.

© 2001 - 2011 Democratic Underground, LLC