Disappearing Cryptography
eBook - ePub

Disappearing Cryptography

Information Hiding: Steganography and Watermarking

  1. 456 pages
  2. English
  3. ePUB (mobile friendly)
  4. Available on iOS & Android
eBook - ePub

Disappearing Cryptography

Information Hiding: Steganography and Watermarking

Book details
Book preview
Table of contents
Citations

About This Book

Cryptology is the practice of hiding digital information by means of various obfuscatory and steganographic techniques. The application of said techniques facilitates message confidentiality and sender/receiver identity authentication, and helps to ensure the integrity and security of computer passwords, ATM card information, digital signatures, DVD and HDDVD content, and electronic commerce. Cryptography is also central to digital rights management (DRM), a group of techniques for technologically controlling the use of copyrighted material that is being widely implemented and deployed at the behest of corporations that own and create revenue from the hundreds of thousands of mini-transactions that take place daily on programs like iTunes.

This new edition of our best-selling book on cryptography and information hiding delineates a number of different methods to hide information in all types of digital media files. These methods include encryption, compression, data embedding and watermarking, data mimicry, and scrambling. During the last 5 years, the continued advancement and exponential increase of computer processing power have enhanced the efficacy and scope of electronic espionage and content appropriation. Therefore, this edition has amended and expanded outdated sections in accordance with new dangers, and includes 5 completely new chapters that introduce newer more sophisticated and refined cryptographic algorithms and techniques (such as fingerprinting, synchronization, and quantization) capable of withstanding the evolved forms of attack.

Each chapter is divided into sections, first providing an introduction and high-level summary for those who wish to understand the concepts without wading through technical explanations, and then presenting concrete examples and greater detail for those who want to write their own programs. This combination of practicality and theory allows programmers and system designers to not only implement tried and true encryption procedures, but also consider probable future developments in their designs, thus fulfilling the need for preemptive caution that is becoming ever more explicit as the transference of digital media escalates.

  • Includes 5 completely new chapters that delineate the most current and sophisticated cryptographic algorithms, allowing readers to protect their information against even the most evolved electronic attacks
  • Conceptual tutelage in conjunction with detailed mathematical directives allows the reader to not only understand encryption procedures, but also to write programs which anticipate future security developments in their design

Frequently asked questions

Simply head over to the account section in settings and click on “Cancel Subscription” - it’s as simple as that. After you cancel, your membership will stay active for the remainder of the time you’ve paid for. Learn more here.
At the moment all of our mobile-responsive ePub books are available to download via the app. Most of our PDFs are also available to download and we're working on making the final remaining ones downloadable now. Learn more here.
Both plans give you full access to the library and all of Perlego’s features. The only differences are the price and subscription period: With the annual plan you’ll save around 30% compared to 12 months on the monthly plan.
We are an online textbook subscription service, where you can get access to an entire online library for less than the price of a single book per month. With over 1 million books across 1000+ topics, we’ve got you covered! Learn more here.
Look out for the read-aloud symbol on your next book to see if you can listen to it. The read-aloud tool reads text aloud for you, highlighting the text as it is being read. You can pause it, speed it up and slow it down. Learn more here.
Yes, you can access Disappearing Cryptography by Peter Wayner in PDF and/or ePUB format, as well as other popular books in Computer Science & Computer Networking. We have over one million books available in our catalogue for you to explore.

Information

Year
2009
ISBN
9780080922706
Edition
3
Chapter 1

Framing Information

Publisher Summary

This chapter introduces a book that deals with steganography and demonstrates how to take words, sounds, and images, and hide them in digital data. Various techniques to do so are discussed and their applications explored in the chapter. Hiding the information so it can’t be found is called steganography. Digital information offers wonderful opportunities to not only hide information, but also to develop a general theoretical framework for hiding the data. Some of the algorithms for hiding information use keys that control how they behave. Steganographic algorithms provide stealth, camouflage, and security to information. The different techniques discussed in the chapter can be combined in many ways. First, information can be hidden by hiding it in a list, and then the list can be hidden in the noise of a file that is then broadcast in a way to hide the source of the data. Hidden information has a variety of uses in products and protocols. Hiding slightly different information or combining the various algorithms creates different tools with different uses. The most interesting applications have been discussed in the chapter. Attacking steganographic algorithms is very similar to attacking cryptographic algorithms and many of the same techniques apply. Steganographic algorithms promise some additional stealth in addition to security so they are also vulnerable to additional attacks, which are presented in the chapter.
On its face, information in computers seems perfectly defined and certain. A bank account either has $1,432,442 or it has $8.32. The weather is either going to be 73 degrees or 74 degrees. The meeting is either going to be at 4 pm or 4:30 pm. Computers deal only with numbers and numbers are very definite.
Life isn’t so easy. Advertisers and electronic gadget manufacturers like to pretend that digital data is perfect and immutable, freezing life in a crystalline mathematical amber; but the natural world is filled with noise and numbers that can only begin to approximate what is happening. The digital information comes with much more precision than the world may provide.
Numbers themselves are strange beasts. All of their certainty can be scrambled by arithmetic, equations and numerical parlor tricks designed to mislead and misdirect. Statisticians brag about lying with numbers. Car dealers and accountants can hide a lifetime of sins in a balance sheet. Encryption can make one batch of numbers look like another with a snap of the fingers.
Language itself is often beyond the grasp of rational thought. Writers dance around topics and thoughts, relying on nuance, inflection, allusion, metaphor, and dozens of other rhetorical techniques to deliver a message. None of these tools are perfect and people seem to find a way to argue about the definition of the word “is”.
This book describes how to hide information by exploiting this uncertainty and imperfection. This book is about how to take words, sounds, and images and hide them in digital data so they look like other words, sounds, or images. It is about converting secrets into innocuous noise so that the secrets disappear in the ocean of bits flowing through the Net. It describes how to make data mimic other data to disguise its origins and obscure its destination. It is about submerging a conversation in a flow of noise so that no one can know if a conversation exists at all. It is about taking your being, dissolving it into nothingness, and then pulling it out of the nothingness so it can live again.
Traditional cryptography succeeds by locking up a message in a mathematical safe. Hiding the information so it can’t be found is a similar but often distinct process often called steganography. There are many historical examples of it including hidden compartments, mechanical systems like microdots, or burst transmissions, that make the message hard to find. Other techniques like encoding the message in the first letters of words disguise the content and make it look like something else. All of these have been used again and again.
David Kahn’s Codebreakers provides a good history of the techniques.[Kah67]
Digital information offers wonderful opportunities to not only hide information, but also to develop a general theoretical framework for hiding the data. It is possible to describe general algorithms and make some statements about how hard it will be for someone who doesn’t know the key to find the data. Some algorithms offer a good model of their strength. Others offer none.
Some of the algorithms for hiding information use keys that control how they behave. Some of the algorithms in this book hide information in such way that it is impossible to recover the information without knowing the key. That sounds like cryptography, even though it is accomplished at the same time as cloaking the information in a masquerade.
Is it better to think of these algorithms as “cryptography” or as “steganography”? Drawing a line between the two is both arbitrary and dangerously confusing. Most good cryptographic tools also produce data that looks almost perfectly random. You might say that they are trying to hide the information by disguising it as random noise. On the other hand, many steganographic algorithms are not trivial to break even after you learn that there is hidden data to find. Placing an algorithm in one camp often means forgetting why it could exist in the other. The best solution is to think of this book as a collection of tools for massaging data. Each tool offers some amount of misdirection and some amount of security. The user can combine a number of different tools to achieve their end.
The book is published under the title of “Disappearing Cryptography” for the reason that few people knew about the word “steganography” when it appeared. I have kept the title for many of the same practical reasons, but this doesn’t mean that title is just cute mechanism for giving the buyer a cover text they can use to judge the book. Simply thinking of these algorithms as tools for disguising information is a mistake. Some offer cryptographic security at the same time as an effective disguise. Some are deeply intertwined with cryptographic algorithms, while others act independently. Some are difficult to break without the key while others offer only basic protection. Trying to classify the algorithms purely as steganography or cryptography imposes only limitations. It may be digital information, but that doesn’t mean there aren’t an infinite number forms, shapes, and appearances the information may assume.

1.0.1 Reasons for Secrecy

There are many different reasons for using the techniques in this book and some are scurrilous. There is little doubt that the Four Horsemen of the Infocalypse— the drug dealers, the terrorists, the child pornographers, and the money launderers— will find a way to use the tools to their benefit in the same way that they’ve employed telephones, cars, airplanes, prescription drugs, box cutters, knives, libraries, video cameras and many other common, everyday items. There’s no need to explain how people can hide behind the veils of anonymity and secrecy to commit heinous crimes.
But these tools and technologies can also protect the weak. In book’s defense, here’s a list of some possible good uses:
1. So you can seek counseling about deeply personal problems like suicide.
2. So you can inform colleagues and friends about a problem with odor or personal hygiene.
3. So you can meet potential romantic partners without danger.
4. So you can play roles and act out different identities for fun.
5. So you can explore job possibilities without revealing where you currently work and potentially losing your job.
6. So you can turn a person in to the authorities anonymously without fear of recrimination.
7. So you can leak information to the press about gross injustice or unlawful behavior.
8. So you can take part in a contentious political debate about, say, abortion, without losing the friendship of those who happen to be on the other side of the debate.
9. So you can protect your personal information from being exploited by terrorists, drug dealers, child pornographers and money launderers.
10. So the police can communicate with undercover agents infiltrating the gangs of bad people.
Chapter 22 examines the promises and perils of this technology in more detail.
The Central Intelligence Agency, for instance, has been criticized for missing the collapse of the former Soviet Union. They continued to issue pessimistic assessments of a burgeoning Soviet military while the country imploded. Some blame greed, power, and politics. I blame the sheer inefficiency of keeping information secret. Spymaster Bob can’t share the secret data he got from Spymaster Fred because everything is compartmentalized. When people can’t get new or solid information, they fall back to their basic prejudices—which in this case was that the Soviet Union was a burgeoning empire. There will always be a need for covert analysis for some problems, but it will usually be much more inefficient than overt analysis.
Anonymous dissemination of information is a grease for the squeaky wheel of society. As long as people question its validity and recognize that its source is not willing to stand behind the text, then everyone should be able to function with the information. When it comes right down to it, anonymous information is just information. It’s just a torrent of bits, not a bullet, a bomb or a broadside. Sharing information generally helps society pursue the interests of justice.
Secret communication is essential for security. The police and the defense department are not the only people who need the ability to protect their schedules, plans, and business affairs. The algorithms in this book are like locks on doors and cars. Giving this power to everyone gives everyone the power to protect themselves against crime and abuse. The police do not need to be everywhere because people can protect themselves.
For all of these reasons and many more, these algorithms are powerful tools for the protection of people and their personal data.

1.0.2 How It Is Done

There are a number of different ways to hide information. All of them offer some stealth, but not all of them are as strong as the others. Some provide startling mimicry with some help from the user. Others are largely automatic. Some can be combined with others to provide multiple layers of security. All of them exploit some bit of randomness, some bit of uncertainty, or some bit of unspecified state in a file. Here is an abstract list of the techniques used in this book:
Use the Noise The simplest technique is to replace the noise in an image or sound file with your message. The digital file consist of numbers that represent the intensity of light or sound at a particular point of time or space. Often these numbers are computed with extra precision that can’t be detected effectively by humans. For instance, one spot in a picture might have 220 units of blue on a scale that runs between 0 and 255 total units. An average eye would not notice if that one spot was converted to having 219 units of blue. If this process is done systematically, it is possible to hide large volumes of information just below the threshold of perception. A digital photo-CD image has 2048 by 3072 pixels that each contain 24 bits of information about the colors of the image. 756k of data can be hidden in the three least significant bits for each color of each pixel. That’s probably more than the text of this book. The human eye would not be able to detect the subtle variations but a computer could reconstruct them all.
Spread the Information Out Some of the more sophisticated mechanisms spread the information over a number of pixels or moments in the sound file. This diffusion protects the data and also makes it less susceptible to detection, either by humans looking at the information or by computers looking for statistical profiles. Many of the techniques that fall into this category came from the radio communication arena where the engineers first created them to cut down on interference, reduce jamming, and add some secrecy. Adapting them to digital communications is not difficult.
Spreading the information out often increases the resilience to destruction by either random or malicious forces. The spreading algorithms often distribute the information in such a way that not all of the bits are required to reassemble the original data. If some parts get destroyed, the message still gets through.
Many of these spreading techniques hide information in the noise of an image or sound file, but there is no reason why they can’t be used with other forms of data as well.
Many of the techniques are closely related to the process of generating cryptographically secure random numbers— that is, a stream of random numbers that can’t be predicted. Some algorithms use this number stream to choose locations, others blend the random values with the hidden information, still others replace some of the random values with the message.
Adopt a Statistical Profile Data often falls into a pattern and computers often try to make decisions about data by looking at the pattern. English text, for instance, uses the letter ‘p’ for more often than the letter ‘q’ and this information can be useful for breaking ciphers. If data can be reformulated so it adopts the statistical profile of the English language, then a computer program minding ps and qs will be fooled.
Adopt a Structural Profile Mimicking the statistics of a file is just the beginning. More sophisticated solutions rely on complex models of the underlying data to better mimic it. Chapter 7, for instance, hides information by mak...

Table of contents

  1. Cover image
  2. Title page
  3. Table of Contents
  4. Copyright
  5. About the Author
  6. Preface
  7. Book Notes
  8. A Start
  9. Chapter 1. Framing Information
  10. Chapter 2. Encryption
  11. Chapter 3. Error Correction
  12. Chapter 4. Secret Sharing
  13. Chapter 5. Compression
  14. Chapter 6. Basic Mimicry
  15. Chapter 7. Grammars and Mimicry
  16. Chapter 8. Turing and Reverse
  17. Chapter 9. Life in the Noise
  18. Chapter 10. Anonymous Remailers
  19. Chapter 11. Secret Broadcasts
  20. Chapter 12. Keys
  21. Chapter 13. Ordering and Reordering
  22. Chapter 14. Spreading
  23. Chapter 15. Synthetic Worlds
  24. Chapter 16. Watermarks
  25. Chapter 17. Steganalysis
  26. Chapter 18. Obfuscation
  27. Chapter 19. Synchronization
  28. Chapter 20. Translucent Databases
  29. Chapter 21. Plain Sight
  30. Chapter 22. Coda
  31. Appendix A. Software
  32. Bibliographic Notes
  33. Bibliography
  34. Index