Blog-based Steganography
Parcially based on Wikipedia article
The word steganography is of Greek origin and means "concealed writing" from the Greek words steganos 
(στεγανός) meaning "covered or protected", and graphei (γραφή) meaning "writing".  The power of 
steganography is reflected in the proverb "To find a needle in a heap of hey" which means almost impossible 
task. The key idea is that secret messages are imbedded into "carrier" text. In case of text it is typically 
larger then the secret message. Crrie can be in different format too (archive, picture, TCP IP packets, 
etc). It is importna that  carrier  looks like completely "innocent" information: regular 
family photos or other images, scholarly articles, shopping lists, private letters or novels. One of 
the early methods was to use invisible ink with lines written between the visible lines of a private 
letter.  In the simplest form milk can be used. It revealed by heating the paper.  
Steganography hides the fact of existence of secret message in some open message or a set of message 
which can be in any feasible format (including pictures).  That provides perfect cover which allow 
to exchange of private messages under repressive regimes hell-bend of snooping citizen communications.  
it also allow civil protest communications, although here the attention of government probably will 
be such that the algorithms will soon be revealed. 
There are some basic definition: 
   - The payload is the data to be covertly communicated. 
 
   - The carrier is the signal, stream, or data file into which the payload is hidden; which 
   differs from the "channel" (typically used to refer to the type of input, such as "a JPEG image")
 
   - The resulting signal, stream, or data file which has the payload encoded into it is sometimes 
   referred to as the package, stego file, or covert message. 
 
   - The encoding density is the percentage of bytes, samples, or other signal elements which 
   are modified to encode the payload. Commonly it is much less then 1. 
 
Additional terminology
   - In a set of files, those files considered likely to contain a payload are called suspects.
   
 
   - If the suspect was identified through some type of statistical analysis, it might be referred 
   to as a candidate.
 
The value of steganography dramatically increased after Snowden revelation. It offer better security 
against a non-human adversary such as NSA data connection algorithms,
ECHELON and similar systems then 
plain vanilla cryptography. If can be combined with cryptography -- in this case steganography messages 
is encrypted or encrypted message is imbedded in steganography set of messages ("carrier"). 
The first recorded use of the term was in 1499 by Johannes Trithemius in his Steganographia, a treatise 
on cryptography and steganography disguised as a book on magic. 
The advantage of steganography over cryptography alone is that messages do not attract attention 
to themselves. Plainly visible encrypted messages arouse suspicion, and may in themselves be incriminating 
in countries where encryption is illegal. Therefore, whereas cryptography protects the contents of a 
message, steganography can be said to protect both messages and communicating parties.
Steganographic coding inside of a transport layer, such as a document file, image file, program or 
protocol can be arbitrarily complex. 
It is not required that the payload is imbedded into a single file. It can be imbedded in multiple 
files, so that nothing can be recovered from a single file.  
Images and other media files are attractive carrier for  steganographic transmission because 
of their large size. As a simple example, payload can be put in ignored sections of a file, such as 
after the comments of the carrier file written in HTML. or by Making text the same color as the background 
in word processor documents and e-mails that are displayed as HTML, PDF or Word Files. 
"After Snowden" problem that your email message are no longer private is pretty annoying. Blogs can 
be used for exchange of private messages between individuals instead of regular email. Posts or comments 
can be fractionalized and the (possibly encrypted) pieces can be  added as comments, Javascript  
programs on the blog post and/or HTML markup. 
As most block allow comments in this case the selection of blogs and the method of hiding the message 
is the symmetric key that sender and recipient are shared; the carrier of the hidden message is the 
whole blogosphere.
Blog bases steganography  can be distributed In this case the payload is split between multiple 
carrier files in several different locations. Which make detection of the payload more difficult. see 
for  example,
U.S. Patent 
8,527,779 by cryptographer William Easttom (Chuck Easttom).
Images present interesting opportunities as a carrier of private messages. it is probably the simplest 
steganography method that can be used with blogs. The larger the cover message is (in data content terms—number 
of bits) relative to the hidden message, the easier it is to hide the latter. For this reason, digital 
pictures (which contain large amounts of data) are used to hide messages on the Internet and on other 
communication media. It is not clear how commonly this is actually done but there are multiple program 
that also to perform this type oftrnasformation of the picture.  the obvious drawback is that this 
technique is well known and as such easily detectable. But required processing power is considerable. 
Requres that each party has its own blog on which it can post images. Most images should be "clean". 
Only specially marked should contain payload. Instead of static images a videostream can be used.
For example: a 24-bit bitmap will have 8 bits representing each of the three color values (red, green, 
and blue) at each pixel. If we consider just the blue there will be 28 different values of blue. The 
difference between 11111111 and 11111110 in the value for blue intensity is likely to be undetectable 
by the human eye. Therefore, the least significant bit can be used (more or less undetectably) for something 
else other than color information. If we do it with the green and the red as well we can get one letter 
of ASCII text for every three pixels.
In the message is encrypted that even detection of the carrier message allow just to retrieve crypto 
text. 
Stated somewhat more formally, the objective for making steganographic encoding difficult to detect 
is to ensure that the changes to the carrier (the original signal) due to the injection of the payload 
(the signal to covertly embed) are visually (and ideally, statistically) negligible; that is to say, 
the changes are indistinguishable from the noise floor of the carrier. Any 
medium can be a carrier, but media with a large amount of redundant or compressible information are 
better suited.
From an information theoretical point of view, this means that the channel must have more capacity 
than the "surface" signal requires; that is, there must be redundancy. For a digital image, this may 
be noise from the imaging element; for digital audio, it may be noise from recording techniques or amplification 
equipment. In general, electronics that digitize an analog signal suffer from several noise sources 
such as thermal noise, flicker noise, and shot noise. This noise provides enough variation in the captured 
digital information that it can be exploited as a noise cover for hidden data. In addition, lossy compression 
schemes (such as JPEG) always introduce some error into the decompressed data; it is possible to exploit 
this for steganography use as well.
Steganography can be used for digital watermarking, where a message (being simply an identifier 
of the device and timestamp) is hidden in an image so that its source can be tracked or verified (for 
example, Coded Anti-Piracy), or even just to identify an image (as in the EURion constellation). Some 
color printers identify this way each page they print. 
   Some modern computer printers use steganography, including
   HP and
   Xerox brand color laser printers. 
   These printers add tiny yellow dots to each page. The barely-visible dots contain encoded printer 
   serial numbers and date and time stamps.[23]
When one considers that messages could be encrypted steganographically 
in e-mail messages, particularly e-mail spam, the notion of junk e-mail takes on a whole new light.
Coupled with the "chaffing and winnowing" technique, a sender could get messages out 
and cover their tracks all at once.
Rumors about terrorists using steganography started first in the daily newspaper USA Today on February 
5, 2001 in two articles titled "Terrorist instructions hidden online" and "Terror groups hide behind 
Web encryption". In July the same year, an article was titled even more precisely: "Militants wire Web 
with links to jihad". A citation from the article: "Lately, al-Qaeda operatives have been sending hundreds 
of encrypted messages that have been hidden in files on digital photographs on the auction site eBay.com". 
Other media worldwide cited these rumors many times, especially after the terrorist attack of 9/11, 
without ever showing proof. The Italian newspaper Corriere della Sera reported that an Al Qaeda cell 
which had been captured at the Via Quaranta mosque in Milan had pornographic images on their computers, 
and that these images had been used to hide secret messages (although no other Italian paper ever covered 
the story). The USA Today articles were written by veteran foreign correspondent Jack Kelley, who 
in 2004 was fired after allegations emerged that he had fabricated stories and sources.
In October 2001, the New York Times published an article claiming that al-Qaeda had used steganography 
to encode messages into images, and then transported these via e-mail and possibly via USENET to prepare 
and execute the September 11, 2001 terrorist attack. The Federal Plan for Cyber Security and Information 
Assurance Research and Development,[22] published in April 2006 makes the following statements:
   "...immediate concerns also include the use of cyberspace for covert communications, 
   particularly by terrorists but also by foreign intelligence services; espionage against sensitive 
   but poorly defended data in government and industry systems; subversion by insiders, including vendors 
   and contractors; criminal activity, primarily involving fraud and theft of financial or identity 
   information, by hackers and organized crime groups..." (p. 9–10) 
   "International interest in R&D for steganography technologies and their commercialization and 
   application has exploded in recent years. These technologies pose a potential threat to national 
   security. Because steganography secretly embeds additional, and nearly undetectable, information 
   content in digital products, the potential for covert dissemination of malicious software, mobile 
   code, or information is great." (p. 41–42) 
   "The threat posed by steganography has been documented in numerous intelligence reports." (p. 
   42) 
   Moreover, an online "terrorist training manual", the "Technical Mujahid, a Training Manual for Jihadis" 
   contained a section entitled "Covert Communications and Hiding Secrets Inside Images."[23]
By early 2002, a Cranfield University MSc thesis developed the first practical implementation of 
an online real-time Counter Terrorist Steganography Search Engine. This was designed to detect the most 
likely image steganography in transit and thereby provide UK Ministry of Defense Intelligence Staff 
a realistic approach to "narrowing the field", suggesting that interception capacity was never the difficulty 
but rather prioritizing the target media.
In 2010, the Federal Bureau of Investigation revealed that the Russian foreign intelligence service 
uses customized steganography software for embedding encrypted text messages inside image files for 
certain communications with "illegal agents" (agents under non-diplomatic cover) stationed abroad.
Spam in message forum is a tremendous problem which is extremely difficult to deal automatically. 
Spammers  usually a very persisted narrow focused on specific theme and can produce multiple variations 
of the same message to avoid detection by the spam filter. All those properties increase their value 
as a carrier. But it presents an interesting opportunity to to use "stream" of spam messages as a carrier. 
In this case "fake" spam messages can be automatically generated. 
As messages of the blog can be updates and the sequence of the updates along with history of updates 
can represent carrier. That actually include "fake" spam messages too. 
If a mirror of the blog of Web site exists, "imperfect" mirror can be used as a carrier.  Imperfect 
quotes is another variation of the same theme. In this case any other site can be used an "imperfect 
mirror". 
Developing Aesop language is another was to including payload into carrier. In this case the hidden 
meaning of the plain text is radically different from "surface meaning". Detection of such things are 
far beyond any power of modern AI and generally is outside computational capabilities of snooping agencies.  
In a way they represent much more complex Turing test then traditional Turing test.  
The use of Aesop’s language may be viewed upon both in the context of culture and within the specific 
framework. The same message may have quite different meanings depending of cultural context and within 
the overall framework of social events which happen at the moment of creation of the message or can 
be understood based on common social experience of two communicating individuals.  For example 
"country shift" or 'fable shift" can not be detected with any automatic processing methods.
In other words, it represent "social encoding" of the payload  and principal structural 
elements of such encoding are far beyond capabilities of modern computers. 
In most case cases the hidden meaning of phrasing one’s thoughts involves either 
ideas which are contradicting and unacceptable for the political regime in question or ideas which are 
common for the whole of mankind. Most often it implies criticism of the given regime.
Any object or life phenomenon may acquire a special symbolic 
value in Aesop language and be understood as such 
by other recipent. It is common consent that the creation of 
symbols is one of the most ancient manifestations of the mental activity of
humans and here essentially a special language is created.  
Steganography is used by some modern printers, including HP and Xerox brand color laser printers. 
Tiny yellow dots are added to each page. The dots are barely visible and contain encoded printer 
serial numbers, as well as date and time stamps.   
Digital steganography output may be in the form of printed documents. A message, the plaintext, may 
be first encrypted by traditional means, producing a ciphertext. Then, an innocuous covertext 
is modified in some way so as to contain the ciphertext, resulting in the stegotext. For example, the 
letter size, spacing, typeface, or other characteristics of a covertext can be manipulated to carry 
the hidden message. Only a recipient who knows the technique used can recover the message and then decrypt 
it. Francis Bacon developed Bacon's cipher as such a technique.
The ciphertext produced by most digital steganography methods, however, is not printable. Traditional 
digital methods rely on perturbing noise in the channel file to hide the message, as such, the channel 
file must be transmitted to the recipient with no additional noise from the transmission. Printing introduces 
much noise in the ciphertext, generally rendering the message unrecoverable. There are techniques that 
address this limitation, one notable example is ASCII Art Steganography.
It is possible to use lookalike characters of the usual ASCII set to look normal, while really carrying 
extra bits of information. If the text is displayed correctly, there should be no visual difference 
from ordinary text. Some systems, however, may display the fonts differently, and the extra information 
would be easily spotted.
Alternately, hidden (e.g., control) characters, and redundant use of markup (e.g., empty bold, underline 
or italics) can add embedded within a body of text to hide information that wouldn't be visually apparent 
when displayed, but can be discovered by examining the document source. 
HTML pages can contain code for extra blank spaces and tabs at the end of lines, as well as different 
colors, fonts and sizes, which will not be visible when displayed. A more trivial example is white text 
on a white background, which can be revealed by "selecting".
One such method is based on the non-printing Unicode characters Zero-Width Joiner (ZWJ) and Zero-Width 
Non-Joiner (ZWNJ).[18] These characters are used for joining and disjoining letters in Arabic, but can 
be used in Roman alphabets for hiding information because they have no meaning in Roman alphabets, and 
because they are "zero-width" and thus not displayed. The embedding of ZWJ in the cover-text represents 
“1” and the embedding of ZWNJ represents “0”. Groups of characters can be used to represent the letters 
A (giving it the code “0”, and thus represented by ZWNJ) to Z (giving it the code “1011”, and thus represented 
by ZWJ,ZWNJ,ZWJ,ZWJ). These character groups can be inserted between each character of the cover-text, 
thereby hiding a message.
Steganography can be more subtle that just hiding message. It can be just  obscuring the "spectrum 
of the signal", for example frequency of letters in English text.  One simple way to obscure frequency 
of letters in English text is to inserting random first bits or letters into the plain text before encryption. 
Among some approaches:   
   - Mimic functions convert one file to have the statistical profile of another. This can 
   thwart statistical methods that help brute-force attacks identify the right solution in a ciphertext-only 
   attack.  
 
   - Messages can be concealed in tampered executable files, exploiting redundancy in the 
   targeted instruction set. 
 
   - Pictures embedded in video material (optionally played at slower or faster speed).
 
   - Injecting imperceptible delays to packets sent over the network from the keyboard. Delays in 
   keypresses in some applications (telnet or remote desktop software) can mean a delay in packets,
   and the delays in the packets can be used to encode data. 
   
 
   - Changing the order of elements in a set.
 
 
Detection of physical steganography is tremendously more difficult the detection of of crypto text. 
In this case the key unknown is what constitutes the carrier. Especailly in digital age where volumes 
of transmitted information are huge this amount to the attempt to fight the needle in a heap of hey.
For example if the suspicion is that paper is the carrier, detection requires careful and complex 
physical examination, including the use of magnification, chemical analysis, ultraviolet light, etc. 
It is an expecsive and very time-consuming process with obvious resource implications. 
However, in the past it was feasible to screen mail of certain suspected individuals or institutions, 
such as prisons or prisoner-of-war (POW) camps. During World War II, a technology used to ease monitoring 
of POW mail was specially treated paper that would reveal invisible ink. An article in the June 24, 
1948 issue of Paper Trade Journal by the Technical Director of the United States Government Printing 
Office, Morris S. Kantrowitz, describes in general terms the development of this paper, three prototypes 
of which were named Sensicoat, Anilith, and Coatalith paper. These were for the manufacture of post 
cards and stationery to be given to German prisoners of war in the US and Canada. 
If POWs tried to write a hidden message the special paper would render it visible. At least two US 
patents were granted related to this technology, one to Mr. Kantrowitz, No. 2,515,232, "Water-Detecting 
paper and Water-Detecting Coating Composition Therefor", patented July 18, 1950, and an earlier one, 
"Moisture-Sensitive Paper and the Manufacture Thereof", No. 2,445,586, patented July 20, 1948. A similar 
strategy is to issue prisoners with writing paper ruled with a water-soluble ink that "runs" when in 
contact with a water-based invisible ink.
In computing, detection of steganographically encoded packages is called steganalysis. The simplest 
method to detect modified files, however, is to compare them to known originals, which is possible in 
case the picture is in public domain.  For example, to detect information being moved through the 
graphics on a website, an analyst can maintain known-clean copies of these materials and compare them 
against the current contents of the site. The differences, assuming the carrier is the same, will compose 
the payload. 
In general, using extremely high compression rate makes steganography difficult, but not impossible. 
While compression errors provide a hiding place for data, high compression reduces the amount of data 
available to hide the payload in, raising the encoding density and facilitating easier detection (in 
the extreme case, even by casual observation).
Steganography has been widely used, including in recent historical times and the present day. Possible 
permutations are endless and known examples include:
   - Hidden messages within wax tablets — The first recorded uses of steganography can be traced 
   back to 440 BC when Herodotus mentions two examples of steganography in his Histories.[2] Demaratus 
   sent a warning about a forthcoming attack to Greece by writing it directly on the wooden backing 
   of a wax tablet before applying its beeswax surface. Wax tablets were in common use then as reusable 
   writing surfaces, sometimes used for shorthand. 
 
   - Hidden messages on messenger's body — also used in ancient Greece. Herodotus tells the 
   story of a message tattooed on the shaved head of a slave of Histiaeus, hidden by the hair that afterwards 
   grew over it, and exposed by shaving the head again. The message allegedly carried a warning to Greece 
   about Persian invasion plans. This method has obvious drawbacks, such as delayed transmission while 
   waiting for the slave's hair to grow, and the restrictions on the number and size of messages that 
   can be encoded on one person's scalp. 
 
   - In his work "Polygraphiae" Johannes Trithemius developed his so-called 
   "Ave-Maria-Cipher" with which one can hide information in a Latin praise of God. "Auctor 
   Sapientissimus Conseruans Angelica Deferat Nobis Charitas Potentissimi Creatoris" for example contains 
   the concealed word VICIPEDIA.[3]
 
   - In the early days of the printing press, it was common to mix different typefaces on a printed 
   page due to the printer not having enough copies of some letters otherwise. Because of this, a message 
   could be hidden using 2 (or more) different typefaces, such as normal or italic, on a page of type.
   
 
   - During World War II, the French Resistance sent some messages written on the backs of couriers 
   using invisible ink. 
 
   - Hidden messages on paper written in secret inks, under other messages or on the blank 
   parts of other messages. 
 
   - Messages written in Morse code on knitting yarn and then knitted into a piece of clothing 
   worn by a courier.
 
   - Jeremiah Denton repeatedly blinked his eyes in Morse Code during the 1966 televised press 
   conference that he was forced into as an American POW by his North Vietnamese captors, spelling out 
   the word, "T-O-R-T-U-R-E". This confirmed for the first time to the U.S. Military (naval intelligence) 
   and Americans that American POW's were being tortured in North Vietnam. 
 
   - Messages written on envelopes in the area covered by postage stamps. 
 
   - During and after World War II, espionage agents used photographically produced microdots to 
   send information back and forth. Microdots were typically minute, approximately less than the size 
   of the period produced by a typewriter. World War II microdots needed to be embedded in the paper 
   and covered with an adhesive, such as collodion. This was reflective and thus detectable by viewing 
   against glancing light. Alternative techniques included inserting microdots into slits cut into 
   the edge of post cards. 
 
   - During WWII, Velvalee Dickinson, a spy for Japan in New York City, sent information to accommodation 
   addresses in neutral South America. She was a dealer in dolls, and her letters discussed the 
   quantity and type of doll to ship. The stegotext was the doll orders, while the concealed "plaintext" 
   was itself encoded and gave information about ship movements, etc. Her case became somewhat famous 
   and she became known as the Doll Woman. 
 
   - In 1968, crew members of the USS Pueblo intelligence ship held as prisoners by North Korea, communicated 
   in sign language during staged photo opportunities, informing the United States they were not defectors, 
   but were captives of the North Koreans. In other photos presented to the US, crew members gave "the 
   finger" to the unsuspecting North Koreans, in an attempt to discredit photos that showed them smiling 
   and comfortable. 
 
Modern steganography entered the world in 1985 with the advent of the personal computer being applied 
to classical steganography problems. Development following that was slow, but has since taken off, going 
by the number of "stego" programs available. Early examples included: 
   - Concealing messages within the lowest bits of noisy images or sound files. 
 
   - Concealing data within encrypted data or within random data. The data to be concealed are first 
   encrypted before being used to overwrite part of a much larger block of encrypted data or a block 
   of random data (an unbreakable cipher like the one-time pad generates ciphertexts that look 
   perfectly random if one does not have the private key). 
 
   - Conceling text within image files. 
 
 
Notable quotes:
"...  However, he adds, "I hope that folks think about their operational security and also about     how journalists can protect themselves – and their sources as well." ..."
 
    They're almost invisible but contain a hidden code – and their presence on a leaked
    document has sparked speculation about their usefulness to FBI investigators. BBC Future |
    
On 3 June, 2017, FBI agents arrived at the house of government contractor Reality Leigh
    Winner in Augusta, Georgia. They had spent the last two days investigating a top secret classified
    document that had allegedly been leaked to the pres s. In order to track down Winner,
    agents claim they had carefully studied copies of the document provided by online news site The
    Intercept and noticed creases suggesting that the pages had been printed and "hand-carried out
    of a secured space".
    In
    an affidavit , the FBI alleges that Winner admitted printing the National Security Agency
    (NSA) report and sending it to The Intercept. Shortly after a story about the leak was
    published, charges against Winner were made public.
    At that point, experts began taking a closer look at the document, now publicly available on
    the web. They discovered something else of interest: yellow dots in a roughly rectangular
    pattern repeated throughout the page. They were barely visible to the naked eye, but formed a
    coded design. After some quick analysis , they
    seemed to reveal the exact date and time that the pages in question were printed: 06:20 on 9
    May, 2017 – at least, this is likely to be the time on the printer's internal clock at
    that moment. The dots also encode a serial number for the printer.
    These "microdots" are well known to security researchers and civil liberties campaigners.
    Many colour printers add them to documents without people ever knowing they're
    there.
 
Dots from a HP Laserjet printer, illuminated with blue light. Credit: Florian
    Heise/Wikipedia .
    In this case, the FBI has not said publicly that these microdots were used to help identify
    their suspect, and the bureau declined to comment for this article. The US Department of
    Justice, which published news of the charges against Winner, also declined to provide further
    clarification.
    In a
    statement , The Intercept said, "Winner faces allegations that have not been proven. The
    same is true of the FBI's claims about how it came to arrest Winner."
    But the presence of microdots on what is now a high-profile document (against the NSA's
    wishes) has sparked great interest.
    "Zooming in on the document, they were pretty obvious," says Ted Han at cataloguing platform
    Document Cloud , who was one of
    the first to notice them. "It is interesting and notable that this stuff is out there."
    Another observer was security researcher Rob Graham, who published a blog
    post explaining how to identify and decode the dots. Based on their positions when plotted
    against a grid, they denote specific hours, minutes, dates and numbers. Several security
    experts who decoded the dots came up with the same print time and date.
    Microdots have existed for many years. The Electronic Frontier Foundation (EFF) maintains a
    list of colour printers
    known to use them . The images below, captured by the EFF, demonstrate how to decode
    them:
 
    These yellow dots, magnified 60 times, were found on a Xerox printout. Credit: Electronic
    Frontier Foundation/CC BY 3.0 .  
    The dots become more easily visible when magnified and photographed under a blue LED
    flashlight. Credit: Electronic Frontier Foundation/CC BY 3.0 .  
    For further clarity, the dots here are annotated. So what does the shape mean? Credit:
    Electronic Frontier Foundation/CC BY 3.0 .  
    The position of the dots reveals the time and date of the printout, and the serial number
    of the device. Credit: Electronic Frontier Foundation/CC BY 3.0 .
    As well as perhaps being of interest to spies, microdots have other potential uses, says Tim
    Bennett, a data analyst at software consultancy Vector 5 who also examined the allegedly leaked
    NSA document.
    "People could use this to check for forgeries," he explains. "If they get a document and
    someone says it's from 2005, [the microdots might reveal] it's from the last several
    months."
    If you do encounter microdots on a document at some point, the EFF has an online tool that should
    reveal what information the pattern encodes.
Hidden Messages
    Similar kinds of steganography – secret messages hidden in plain sight – have
    been around for much longer.
    Slightly more famously, many banknotes around the world feature a peculiar
    five-point pattern called the Eurion constellation . In an effort to avoid counterfeiting,
    many photocopiers and scanners are programmed not to produce copies of the banknotes when this
    pattern is recognised.
    The NSA itself points to a fascinating historical example of tiny dots forming messages
    – from World War Two. German spies in Mexico were found to have taped
    tiny dots inside the envelope concealing a memo for contacts in Lisbon.
    At the time, these spies were operating undercover and were 
    trying to get materials from Germany , such as radio equipment and secret ink. The Allies
    intercepted these messages, however, and disrupted the mission. The tiny dots used by the
    Germans were often simply bits of unencrypted text miniaturised to the size of a full-stop.
    This sort of communication was widely used during WWII and afterwards, notably during the
    Cold War. There are reports of agents operating for the Soviet Union, but based undercover in
    West Germany and 
    using letter drops to transmit these messages .
    Microdots taped inside the label of an envelope sent by German spies in Mexico City to
    Lisbon during World War Two. Credit: Wikipedia .
    And today, anyone can try using microtext to protect their property – some companies,
    such as Alpha Dot in the UK , sell
    little vials of permanent adhesive full of pin-head sized dots, which are covered in
    microscopic text containing a unique serial number. If the police recover a stolen item, the
    number can in theory be used to match it with its owner.
    Many examples of these miniature messages do not involve a coded pattern as with the output
    of many colour printers, but they remain good examples of how miniscule dispatches physically
    applied to documents or objects can leave an identifying trail.
    Some forms of text-based steganography don't even use alphanumeric characters or symbols at
    all. Alan Woodward, a security expert at the University of Surrey, notes the example of 'Snow'
    – Steganographic Nature Of Whitespace – which places spaces and tabs at the end of
    lines in a piece of text. The particular number and order of these white spaces can be used to
    encode an invisible message.
    "Locating trailing whitespace in text is like finding a polar bear in a snowstorm,"
    the Snow website explains .
    Woodward points out, though, that there are usually multiple ways of tracing documents back
    to whoever printed or accessed them.
    "Organisations such as the NSA have logs of every time something is printed, not just
    methods of tracking paper once printed," he says. "They know that people know about the yellow
    dots and so they don't rely upon it for traceability."
    There is a long-running debate over whether it is ethical for printers to be attaching this
    information to documents without users knowing. In fact, there has even been a suggestion that
    it is a
    violation of human rights and one MIT
    project has tracked more than 45,000 complaints to printer companies about the
    technology.
    Still, many believe that the use of covert measures to ensure the secrecy of classified
    documents remains necessary in some cases.
    "There are things that governments should be able to keep secret," says Ted Han.
    However, he adds, "I hope that folks think about their operational security and also about
    how journalists can protect themselves – and their sources as well."
    
 
   
   
      
    
I doubt that this is promising as described, but something along those lines (with predefined set 
of equivalencies) can be developed further. Consider instructions equivalencies as some kind of bit 
mask that can be applied to any of the program strings  
   
   Netizens with extreme privacy needs got a new tool for their cyber utility belts recently with 
   the release of an application that lets users hide secret messages in virtually any executable computer 
   program, without changing the program's size or affecting its operation. 
   The tool is called "Hydan," an old English word for the act of hiding something, and it's part 
   of a research project by Columbia University computer science masters student Rakan El-Khalil, who 
   showed off the program to a small group of open-source programmers and hackers gathered at the second 
   annual CodeCon conference in San Francisco on Sunday. 
   Hydan is a novel development in the field of steganography -- the science of burying secret 
   messages in seemingly innocuous content. Popular stego programs operate on image and music 
   files, where a secret missive can be hidden without altering the content enough to be perceived by 
   human senses. But because they contain instructions for a computer's processor, executable files 
   are less forgiving of tampering. Improperly changing a single bit of executable code can render an 
   application completely unusable. 
   El-Khalil's research focused on redundancies in the Intel x86 instruction set -- places 
   where at least two different instructions are effectively the same. Each choice between two 
   redundant options can represent a single bit of data. "The problem with program binaries is there 
   is just not a lot of redundancy in them," said El-Khalil. 
   He found some of that useful redundancy in the instructions that tell the computer to add or subtract.
   
   A computer instruction to add the number 50 to another value, for example, can be replaced with 
   an instruction to subtract the number -50 instead. Mathematically, the instructions are the same. 
   In choosing between the two, a stego program can get one bit of covert storage out of each addition 
   or subtraction operation in the executable -- without changing the way the application runs, or adding 
   a single byte to its size. "If we use a scenario in which addition is zero, and subtraction is one, 
   we can just go through and flip them as needed," El-Khalil explained.
   El-Khalil concedes that the method is imperfect -- an application that's been impressed 
   with a secret message has considerably more "negative subtractions" than an unadulterated program, 
   making it easy to pick out through a statistical analysis. Hydan could also break programs 
   that are self-modifying or employ other unconventional techniques. And it's less efficient than stego 
   programs for image and sound files: good steganography for a JPEG file can hide one byte of storage 
   in 17 bytes of image, while Hydan's ratio is one byte of storage to 150 bytes of code. 
   Future versions of Hydan 
   will boost that capacity by finding different places to code data, such as in the order of a program's 
   functions, and the order in which arguments are passed to those functions. For now, the application 
   is still powerful enough to secretly stash the United States Constitution and the Declaration of 
   Independence in a single copy of Microsoft Word. 
   Beyond the covert uses, the technology could be used to attach a digital signature to an application, 
   or to embed an executable with a virtual watermark. 
Softpanorama Recommended
Papers
   CHACS 
   Publications for 2002 Moskowitz, Ira S., Neil F. Johnson, and Michael Jacobs, "A Detection Study 
   of an NRL Steganographic Method", NRL/MR/554002-8635, August 16, 2002.
   
   PDF 
   
      For a bound, easier to read, copy of this please contact: 
      Ms. L. Norton, Library---Code 5225, NRL, Washington, DC 20375 
      In this report we analyze in detail a method of image steganography developed by NRL. Our conclusion 
      is that this method of steganography is undetectable by current pragmatic statistical stego detection 
      techniques, primarily because it alters a very small number of pixels. The small size of the 
      embedded message is the key to the lack of detection, provided that a non-anomalous cover image 
      is used. 
   
   Newman, Richard E., Ira S. Moskowitz, LiWu Chang, and Murali M. Brahmadesam, "A Steganographic 
   Embedding Undetectable by JPEG Compatibility Steganalysis", Proc. Information Hiding 2002, 7-9 October 
   2002, (final proceedings will be published by Springer, LNCS series, ed. F.A.P. Petitcolas).
   
   PDF 
   
      Steganography and steganalysis of digital images is a cat-and-mouse game. In recent work, Fridrich, 
      Goljan and Du introduced a method that is surprisingly accurate at determining if bitmap images 
      that originated as JPEG files have been altered (and even specifying where and how they were altered), 
      even if only a single bit has been changed. However, steganographic embeddings that encode embedded 
      data in the JPEG coefficients are not detectable by their JPEG compatibility steganalysis. 
      This paper describes a steganographic method that encodes the embedded data in the spatial domain, 
      yet cannot be detected by their steganalysis mechanism. Furthermore, we claim that our method 
      can also be used as a steganographic method on files stored in JPEG format. The method described 
      herein uses a novel, topological approach to embedding. The paper also outlines some extensions 
      to the proposed embedding method. 
   
   Moskowitz, Ira S., Garth E. Longdon and LiWu Chang, "A New Paradigm Hidden in Steganography". 
   Proceedings, New Security Paradigms Workshop, Sept. 2000, Ballycotton, Co. Cork, Ireland. Also appears 
   in "The Privacy Papers," ed. R. Herold, Auerbach Press, 2001.
   
   PostScript,
   
   PDF 
   
      We discuss how steganography, in contrast to similar disciplines, requires a new paradigm based 
      upon discontinuities and the absence of noise as a detection deterrent. 
   
Links
CHACS 
Publications for 2002 Moskowitz, Ira S., Neil F. Johnson, and Michael Jacobs, "A Detection Study 
of an NRL Steganographic Method", NRL/MR/554002-8635, August 16, 2002.
PDF 
 
   For a bound, easier to read, copy of this please contact: 
   Ms. L. Norton, Library---Code 5225, NRL, Washington, DC 20375 
   In this report we analyze in detail a method of image steganography developed by NRL. Our conclusion 
   is that this method of steganography is undetectable by current pragmatic statistical stego detection 
   techniques, primarily because it alters a very small number of pixels. The small size of the embedded 
   message is the key to the lack of detection, provided that a non-anomalous cover image is used.
   
Newman, Richard E., Ira S. Moskowitz, LiWu Chang, and Murali M. Brahmadesam, "A Steganographic Embedding 
Undetectable by JPEG Compatibility Steganalysis", Proc. Information Hiding 2002, 7-9 October 2002, (final 
proceedings will be published by Springer, LNCS series, ed. F.A.P. Petitcolas).
PDF 
   Steganography and steganalysis of digital images is a cat-and-mouse game. In recent work, Fridrich, 
   Goljan and Du introduced a method that is surprisingly accurate at determining if bitmap images that 
   originated as JPEG files have been altered (and even specifying where and how they were altered), 
   even if only a single bit has been changed. However, steganographic embeddings that encode embedded 
   data in the JPEG coefficients are not detectable by their JPEG compatibility steganalysis. This paper 
   describes a steganographic method that encodes the embedded data in the spatial domain, yet cannot 
   be detected by their steganalysis mechanism. Furthermore, we claim that our method can also be used 
   as a steganographic method on files stored in JPEG format. The method described herein uses a novel, 
   topological approach to embedding. The paper also outlines some extensions to the proposed embedding 
   method. 
Moskowitz, Ira S., Garth E. Longdon and LiWu Chang, "A New Paradigm Hidden in Steganography". Proceedings, 
New Security Paradigms Workshop, Sept. 2000, Ballycotton, Co. Cork, Ireland. Also appears in "The Privacy 
Papers," ed. R. Herold, Auerbach Press, 2001.
PostScript,
PDF 
   We discuss how steganography, in contrast to similar disciplines, requires a new paradigm based 
   upon discontinuities and the absence of noise as a detection deterrent.