Talk:Steganography

From Wikipedia, the free encyclopedia

Steganography was a good article candidate, but did not meet the good article criteria at the time. Once the objections listed below are addressed, the article can be renominated. You may also seek a review of the decision if you feel there was a mistake.

Date of review: No date specified. Please edit template call function as follows: {{FailedGA|insert date in any format here}}

News This page has been cited as a source by a media organization. See the 2005 press source article for details.

The citation is in: James Taranto. "Does Zarqawi Take Shorthand?", Wall Street Journal, December 9, 2005.

Peer review Steganography has had a peer review by Wikipedia editors which is now archived. It may contain ideas you can use to improve this article.
WikiProject on Cryptography This article is part of WikiProject Cryptography, an attempt to build a comprehensive and detailed guide to cryptography in the Wikipedia. If you would like to participate, you can choose to edit the article attached to this page, or visit the project page, where you can join the project and see a list of open tasks.

Archive: /Archive 1

Contents

[edit] Fact Checking - Ancient Wax Tablets

Several facts about the wax tablets sent after the battle of Thermopylae were wrong in the article. The tablets were not sent to Xerxes but from Demaratus to Greece. In fact Xerxes was King of the Persians, the very person Demaratus didn't want to learn about the hidden message. Also according to Herodotus, nothing was written in the wax poured on top of the hidden message. I think this fact is often ignored to make the story a more convenient example of early steganography. I had to go to the original source, Polymnia by Herodotus, to scrounge up what really happened. Wikipidia wasn't the only place I looked with the wrong facts on this point. I have a book on cryptography in front of me right now that states the tablets were sent to King Leonidas. Leonidas was dead when the tablets were sent! Here's a link to the appropriate page in Polymnia.

--Takaitra 01:01, 5 March 2006 (UTC)

[edit] Removed sentence

Effective detection of steganographically encoded materials in communications intercepts between suspected terrorists is therefore extremely important, but very complicated, as we will see below.

I removed this sentence as it appeared completely out of place following a lengthy tract on showing that there is no actual evidience for Al Quaeda use of steganography. Refdoc 23:38, 8 March 2006 (UTC)

[edit] Evening Courier

The article mentions Il Corriere della Sera as an Italian tabloid newspaper. The paper is in fact a somewhat high-brow broadsheet.

Also, the article states that an item of news reported in this newspaper was not confirmed by any reputable Italian newspaper. There is a debatable implication there to the effect that Il Corriere della Sera is not reputable. Given that Il Corriere della Sera is generally considered one of Italy's more serious and less biassed newspapers, and given that it has the second-highest distribution of all newspapers in Italy, it might be worth considering an adjustment to the paragraph in question.

(More info on the paper here: http://en.wikipedia.org/wiki/Il_Corriere_della_sera )

--Croc996 00:25, 26 March 2006 (UTC)

[edit] GA failed

For these reasons:

  • See WP:LEAD as the present lead section doesn't summarize the article but gives insight into etymology.
  • 2 references is not enough.
  • This section would be better if transformed into prose.
  • The external links through the text should be transformed into inline citations. See WP:FOOT.
Lincher 00:23, 11 June 2006 (UTC)

[edit] No better photos?

The picture for Pike's Peak is poor. Doesn't anyone have any better shots?


[edit] Steganography + Crypto

Is it worth adding a discussion of how to do encrypted steganography? In particular, this ought to escape detection. In the case of the photo, with the cat/trees, what you do instead is:

1)Take your plaintext (cat). 2)Add error-checking 3)Compress it (to make the data look random) - and to save space 4)Encrypt it. (the resulting data should now look very-nearly like random noise) 5)Replace the least-significant 2 bits of the tree image.

At this point, we should have a steganographic file, which will not draw attention to itself, which will probably (depending on randomness of step 4) escape detection even if it is suspected, and which even if it is discovered to be steganographic, cannot (hopefully) be unencrypted.

  1. Encrypting can certainly be an additional useful step, in that it prevents total disaster if the message is detected. But it is not necessarily true that the near-random distribution of bits found in modern digital ciphertexts will be harder to detect. Your step 5) can be generalised to "map the hidden message to the covertext in such a way as to minimise changes in its statistical properties". If the LSBs of the image are not as random as a ciphertext -- as is usually the case -- then it is not impossible that encrypting first will actually increase detectability. The continued study of steganography of course looks at mapping methods which minimise these changes for various types of input texts, and for some combinations of methods and covertexts it might happen that a very random stegotext is optimal. But probably not for this method.
  2. In general, if you are going to add ECC you need to do them after encryption. Most encryption methods, and all compression methods of which I am aware, expand errors; so if an error occurs in transmission, the message will decrypt with a lot of junk, decompress with even more (if it decompresses at all) and then there will be too much garbage for the ECC to be able to salvage anything. Of course if you do ECC after encryption that then adds structure to the message which might make steganography harder; but there doesn't seem to be much point doing it the other way. -- Securiger 06:17, 2 August 2006 (UTC)

[edit] Keyboards that talk IP!

Removed bogus "technique". This doesn't even sound plausible; removed for now. Viral keyboard firmware which can transmit data over a network? It's not even April 1st! Come on guys, let's sanity check out facts before making edits... If anyone would like to reinstate, please include suitable citations!

This was done at USENIX this year: https://db.usenix.org/events/sec06/tech/shah/shah_html/index.html

Lunkwill 21:29, 12 August 2006 (UTC)

[edit] Camera/Shy and Hacktivismo

Should Camera/Shy, a steganography program dedicated towards allowing users in censored countries to access censored material be added, or does this violate some WP policy? If I don't get a response soon I'll post up a bit on it.

Isn't that encouraging people not to reply? I've looked up Camera/Shy and you might want to use the following link: Camera/Shy Perhaps in the external links with a short blurp ("a <what is it> that <what makes it special>"). Shinobu 18:09, 31 August 2006 (UTC)

[edit] External Links deleted?

Why?

I don't know... perhaps Wikipedia is not a link farm? I can't be any more specific without the actual url that has been removed. Shinobu 01:48, 23 September 2006 (UTC)

[edit] Use of italics

Despite being dismissed by security experts [1][2], the story has been widely repeated and resurfaces frequently. It was noted that the story apparently originated with a press release from "iomart" [3], a vendor of steganalysis software. No corroborating evidence has been produced by any other source.
Moreover, a captured al-Qaeda training manual makes no mention of this method of steganography. The chapter on communications in the al-Qaeda manual acknowledges the technical superiority of US security services, and generally advocates low-technology forms of covert communication.

The italics in this section look very dodgy (and, specifically, not NPOV). The actual comments within the italics are fine, provided that they are true, but do not need to be italicised.

Unless the italics are some kind of steganographic signal pointing at hidden content, of course... :) --Sapphire Wyvern 07:10, 27 September 2006 (UTC)

I have removed the italics. I agree with Sapphire Wyvern's post. The italics immediately jumped out to me as potentially violating NPOV when I first read the article: not just offering the evidence contradicting the NYT article but 'trying to make a point' about just how wrong the article was. Rfrohardt 19:33, 22 February 2007 (UTC)

[edit] Thermal Noise is not 1/f Noise

This article states that "Any system with an analog (signal) amplification stage will also introduce so-called thermal or "1/f" noise, which can be exploited as a noise cover." This sentence makes it sound like thermal noise is 1/f noise. In fact, 1/f noise is Flicker Noise, which is a completely separate noise source from thermal. I suggest this error be corrected as soon as possible. Since this is considered a 'good article' I hesitate to make the changes myself. --Dirkbike 19:55, 30 October 2006 (UTC)

Well, it's been about a week so I decided to make the corrections anyway. Please let me know if there are any objections.--Dirkbike 23:58, 5 November 2006 (UTC)

[edit] Fujitsu system for hiding message in a printed picture

i have just read a bbc news item about a system that fujitsu are developing to hide messages. I them looked at this artical to see if I could find more info about it. maybe someone should add somthing to this artical about this. the url was http://news.bbc.co.uk/1/hi/technology/6361891.stm --82.12.52.135 17:43, 15 February 2007 (UTC)

Ah ha, darn, you beat me to it :[ I was just going to talk about that here. That Jason 23:47, 15 February 2007 (UTC)