History of Steganography
Early History - The Ancients
Tattoo
Recounted by Greek historian Herodotus:
Histiaeus, a Greek tyrant, was being held prisoner by a rival king. He wanted to send a message
to his son-in-law without it being noticed. He decided to shave the head of a slave, and tattoo
the message on the slave's head. The slave then waited for his hair to grow back before making
the journey to deliver the message to Histiaeus' son-in-law.
Use Food
Herodotus also provided the following story:
A nobleman from Medea wanted to send a message to a potential ally. He hid the message in the
belly of an unskinned hare. The hare was delivered by a messenger, who was disquised as a hunter.
Covering the Message
This is the third story from Herodotus:
A soldier named Demeratus had to send a message to Sparta that an attack was coming. The Xerxes
planned to invade Greece. Demeratus took a wax-covered tablet, then the writing medium, and removed
the wax. He then wrote his message on the wood of the tablet, and re-covered the tablet with wax.
This allowed the tablet to appear as though it were blank, and the message to be sent undetected.
The Original Invisible Inks
Ancient Romans would use substances such as fruit juices, urine and milk to create invisible inks.
They would then use these inks to write messages between the lines of a visible message. The hidden
messages would be revealed when the invisible inks were darkened from being heated. This method
began being used in the first century AD, and lasted through World War II, with vinegar also being
used to make the invisible ink.
Fourteenth Century
First Letter
Amorosa visione by Giovanni Boccaccio contained a signature to identify it as his work.
Three sonnets were encoded into the first letters of the first verse of each tercet from other
poems.
Sixteenth Century
Cardan's Grille
This technique was originally conceived in China, then reinvented by Cardan in the 1500s. The letters
of the secret message form a random pattern that can be accessed simply by placing a mask over the text.
An example provided by Fridrich is taking the secret message then changing the letters to the next one
in the alphabet. The new letters are then placed in a fake message, with the first letter of certain
words being the encrypted secret message. The words that contain the message are chosen using a numerical
sequence, in this case pi. For example, the first letter of the third word of the cover message is the
first letter of the encrypted secret message. The first letter of the next word of the cover message is
the second letter of the encrypted secret message. The first letter of the fourth word after that is the
third letter of the encrypted secret message, and so on.
Letter Pattern
Johannes Trithemius, a monk who is considered to be one of the founders of modern cryptography, hid
secret messages in his three volume work Steganographia. He used long prayers consisting of
the names of angels to hide secret messages. The messages would appear as a pattern of letters. For
example the prayer could be: "padiel aporsy mesarpon omeuas peludyn malpreaxo." To discover the
message, use every other letter in every other word. The hidden message is: "prymus apex".
"Ave Maria" Cipher
The "Ave Maria" cipher was also invented by Johannes Trithemius and appears in Stegranographia.
The work contains a series of tables. In each table is a list of words, with each word corresponding
to a particular letter. The message is coded by replacing each letter of the message with the
corresponding words from the tables. The message will appear to be a prayer if the tables are used in
order, and one table is used per letter.
Twentieth Century
Markings into Drawings
During the Boer War, the British enlisted Lord Robert Baden-Powell to be a scout. He was
to find the positions of Boer artillery bases, and mark them on maps. In order to avoid
suspicion, if he was caught by the Boers, he would make drawings of butterflies out of
the markings. Certain markings on the wings of the butterflies represented the positions
of the Boer military installations. However, when looking at the butterflies, one could
not tell this information was hidden among the drawings.
Open Code
German spies during World War I would report British warships by using fake cigar orders.
The orders would represent the different types of warships. For example, the order "500
cigars needed in Portsmouth" meant "five cruisers were in Portsmouth".
Null Cipher
During World War II, a German spy sent this message: "Apparently neutral's protest is
thoroughly discounted and ignored. Isman hard hit. Blockade issue affects pretext for
embargo on by-products, ejecting suets and vegetable oils." The hidden message is:
"Pershing sails from NY June 1," which can be found using the second letter of each word.
Microdot
Developed by the Nazis during World War I, the microdot was a photograph the size of a
typed period. When the photograph was developed, it could reproduce to a standard-sized
typewritten page with excellent clarity. The Germans would use the microdots to transmit
high volumes of printed data and technical drawings. The microdots were discovered by
the Americans only after informed by a double agent. The agent warned: "watch out for the
dots - lots and lots of little dots." The concept came from Brewster, who in 1857, developed
the idea to shrink a message to the point where it resembles a speck of dirt, but still
readable using high magnification.
Invisible Inks Revamped
Nazi spy George Dash used a special solution of copper sulfate to write messages on his
handkerchief. The messages would only appear when exposed to ammonia fumes.
Codetalkers
Navajo Indians, employed by the U.S. Marines stationed in the Pacific during World War II,
would transmit messages, using a slang version of their native language, over the radio.
Only 28 non-Navajos could speak and understand the Navajo language, and only those who knew
the slang could understand the messages.
Morse Code and Blinking
Commander Jeremiah Denton, a prisoner of war, was forced by his Vietnamese captors to give
a television interview in 1966. He used the opportunity to send a message by blinking his
eyes in Morse code to spell out "torture".
The Digital Age
Digital Fingerprints
Digital fingerprinting is done by creating a metafile that describes the contents of the
source file. An example of this would be encrypted satellite television broadcasting. Users
"could be issued a set of keys to decrypt the video streams and the television station could
insert fingerprint bits into each packet of the traffic to detect unauthorized uses. If a
group of users give their subset of keys to unauthorized people, at least one of the key
donors can be traced when the unauthorized decoder is captured." (Thampi)
Digital Watermarking
This is hiding trademarks in images and music. The watermark contains information that will
uniquely identify it, even from another image or piece of audio that looks identical to the
human eye. The watermark is not detectable by looking at the image or listening to the audio
file.