Steganography challenge

In the past, I have posted a few cipher challenges for the cryptographically inclined. Here is a new one:

The above is an example of steganography rather than cryptography, though the two can be easily combined. Indeed, the same approach used above could be applied in a far more subtle and effective fashion. To save people some trouble, I can tell you that the hidden message is in the actual text shown, not hidden somewhere in the data file.

Here is a hint, weakly enciphered using ROT13: Guvf sbez bs frperg jevgvat jnf vairagrq ol Senapvf Onpba.

Author: Milan

In the spring of 2005, I graduated from the University of British Columbia with a degree in International Relations and a general focus in the area of environmental politics. In the fall of 2005, I began reading for an M.Phil in IR at Wadham College, Oxford. Outside school, I am very interested in photography, writing, and the outdoors. I am writing this blog to keep in touch with friends and family around the world, provide a more personal view of graduate student life in Oxford, and pass on some lessons I've learned here.

9 thoughts on “Steganography challenge”

  1. Presumably, the message is hidden in the pattern of italic and non-italic letters.

  2. Non-italic: N
    Italic: I

    NIINIININIININNINIINIINNNIINNNNINIINIIINNIIINNNNNIIINNINNIINNNNINIIIININNIINNNNINIININIINIININNINIINIINNNIINIIINNIIIINNINIINNNIINIININIINIIIINNINIINININNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNN

  3. TheBaconiancipheruseddifferentgroupsThisapproachismoremodern

    01110100011011110110111101100101011000010111001101111001

  4. 011101000110111101101111001000000110010101100001011100110111100100100000011010010110111001100100011001010110010101100100001000000110001001110101011101000010000001101001011101000010000001100011011011110111010101101100011001000010000001100010011001010010000001100011011011110110110101100010011010010110111001100101011001000010000001110111011010010111010001101000001000000110010101101110011000110111001001111001011100000111010001101001011011110110111000100000011001010110000101110011011010010110110001111001

  5. Steganography: A Powerful Tool for Terrorists and Corporate Spies

    June 28, 2005 | 2154 GMT

    An incorrect CIA analysis caused U.S. authorities to cancel more than two dozen international flights and raise the Homeland Security Department’s terrorism alert level in late 2003, NBC news reported June 27. According to the report, the CIA believed that Al Jazeera, the Arabic-language satellite news channel based in Qatar, was transmitting coded information to terrorists using the moving text along the bottom of the screen, known as the “crawl.” Al Jazeera, the agency believed, was using a technique called “steganography” to conceal the codes.

    At the time, CIA analysts believed the secret messages involved dates, locations and targets of terrorist attacks, including flight numbers of international flights and geographic coordinates of targets. Based in part on the analysis, authorities canceled almost 30 international flights by Air France, British Airways, Continental Airlines and Aeromexico, and raised the terrorism alert level to orange — the second-highest level — where it stayed for weeks. At the time, then-Secretary of Homeland Security Tom Ridge said the heightened state of alert was based on “credible sources.” Hidden messages, however, apparently were never found in Al Jazeera’s crawl.

    Steganography, the technique of concealing hidden text and images in video images, is used to convey information to the intended recipient — and only the intended recipient. The word, which originated in antiquity and means “covered writing” in ancient Greek, was used by ancient armies to send secret messages back and forth between enemy lines. In modern times, steganography refers to encoding messages in computer software using algorithms and passwords.

    Steganographic applications hide one computer file within another and are available on many different platforms, including Windows, Linux and BSD. Two files are needed for steganography. The first, known as a “cover file,” is a normal graphic or audio file, such as a .bmp, .jpeg or .wav. The second is the secret file — another image or document in any format. The second file is hidden in the cover file in the form of an algorithm. Using decrypting software, the recipient can use a password to decode the hidden file.

    Like any code, steganography can be used for both legitimate and nefarious purposes. A good use might be hiding a list of passwords or access codes in an innocuous picture. Another use is a technique called “digital watermarking,” used by individuals and corporations to secure and enforce copyrights by placing a hidden mark in a file. Steganography, however, also can be use to smuggle confidential or critical data out of a company disguised as innocent pictures. This technique can be used to compromise security information, such as the itineraries of CEOs and the composition of personal protection details. There is no limit to the kind or the amount of information that can be compromised.

  6. “Carmen and her mother are close. As far as Carmen’s concerned, she has nothing to hide from her mother so she’s happy to have her mom as her ‘friend’ on Facebook. Of course, Carmen’s mom doesn’t always understand the social protocols on Facebook and Carmen sometimes gets frustrated. She hates that her mom comments on nearly every post, because it “scares everyone away…Everyone kind of disappears after the mom post…It’s just uncool having your mom all over your wall. That’s just lame.” Still, she knows that her mom means well and she sometimes uses this pattern to her advantage. While Carmen welcomes her mother’s presence, she also knows her mother overreacts. In order to avoid a freak out, Carmen will avoid posting things that have a high likelihood of mother misinterpretation. This can make communication tricky at times and Carmen must work to write in ways that are interpreted differently by different people.

    When Carmen broke up with her boyfriend, she “wasn’t in the happiest state.” The breakup happened while she was on a school trip and her mother was already nervous. Initially, Carmen was going to mark the breakup with lyrics from a song that she had been listening to, but then she realized that the lyrics were quite depressing and worried that if her mom read them, she’d “have a heart attack and think that something is wrong.” She decided not to post the lyrics. Instead, she posted lyrics from Monty Python’s “Always Look on the Bright Side of Life.” This strategy was effective. Her mother wrote her a note saying that she seemed happy which made her laugh. But her closest friends knew that this song appears in the movie when the characters are about to be killed. They reached out to her immediately to see how she was really feeling.

    Carmen is engaging in social steganography. She’s hiding information in plain sight, creating a message that can be read in one way by those who aren’t in the know and read differently by those who are. She’s communicating to different audiences simultaneously, relying on specific cultural awareness to provide the right interpretive lens. While she’s focused primarily on separating her mother from her friends, her message is also meaningless to broader audiences who have no idea that she had just broken up with her boyfriend. As far as they’re concerned, Carmen just posted an interesting lyric.”

  7. …. . – …. .- – .– — ..- .-.. -.. -.- . . .–. .- … . -.-. .-. . – –..– — ..- … – -.- . . .–. .. – … . -.-. .-. . – – …. .- – …. . …. .- … .- … . -.-. .-. . – – — -.- . . .–

Leave a Reply

Your email address will not be published. Required fields are marked *