Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Encryption Security Science

Blocking Steganosonic Data In Phone Calls 185

psyced writes "Steganography is a technique to encode secret messages in the background noise of an audio recording or photograph. There have been attempts at steganalysis in the past, but scientists at FH St. Pölten are developing strategies to block out secret data in VoIP and even GSM phone calls by preemptively modifying background noise (link is to a Google translation of the German original) on a level that stays inaudible or invisible, yet destroys any message encoded within. I wonder if this method could be applied to hiding messages in executables, too."
This discussion has been archived. No new comments can be posted.

Blocking Steganosonic Data In Phone Calls

Comments Filter:
  • by Creepy Crawler ( 680178 ) on Wednesday April 02, 2008 @03:33AM (#22938374)
    The butterfly flaps its wings twice.

    I repeat, the butterfly flaps its wings twice.
  • by Zemran ( 3101 ) on Wednesday April 02, 2008 @03:43AM (#22938408) Homepage Journal
    would result in significant audible alteration of the sound to the point of unusability....

    Sounds like an average mobile phone call to me...
  • by SharpFang ( 651121 ) on Wednesday April 02, 2008 @03:48AM (#22938420) Homepage Journal
    I wonder if this method could be applied to hiding messages in executables, too.

    Yes, a similar method has been employed by Microsoft to all the executables it ever released, ever since the times of MS-DOS.
    After compilation they run the program through a special utility that modifies a few bits in the executable at random. Then they run the resulting executable through some tests and if it passes, they release it, if it crashes, they try with a different random bits.
  • by Alsee ( 515537 ) on Wednesday April 02, 2008 @04:48AM (#22938594) Homepage
    After anti-steganographic transformation:

    I saw a bug.

    -
  • by Chrisq ( 894406 ) on Wednesday April 02, 2008 @05:04AM (#22938638)
    The butterfly flaps its wings twice.

    I repeat, the butterfly flaps its wings twice.


    Please clarify immediately. Is that just a repetition or does the butterfly flap its wings four times. This could be the difference between a gang of naked teenagers invading Prime Minister's question time and the defacing of Nelson's column.
  • by StuckInSyrup ( 745480 ) on Wednesday April 02, 2008 @05:19AM (#22938688)

    (since the signals used to transmit the secret message are the same as the ones transmitting the public message, and they do not have permission for destroying the public message)
    Did you just call a phone call a "public message"? Man, you are even more cynic about privacy than I am.
  • by The Clockwork Troll ( 655321 ) on Wednesday April 02, 2008 @05:36AM (#22938734) Journal

    Any amount of noise you add can simply be dealt with by including the stego data more than once or using checksums or whatever

    Yes, but how to do this in real-time in a cryptographically secure manner is the subject of much ongoing research.

    The feeling in the research community at the moment is that efficient stego-redundancy requires a working database of discovered steganographic synonyms, i.e. a stegosaurus [wikipedia.org].

  • by CmdrGravy ( 645153 ) on Wednesday April 02, 2008 @06:18AM (#22938860) Homepage
    Are you Mr Xaviar, Mr Francis Xaviar of Mile End Road, London ?

    Just need to check because that looked like one of the secret code words I am supposed to be watching out for, anyway if that is you Francis ( there is a code word for this somewhere but I think it's in the basement somewhere so I'll just give you the gist ) the "materials", you know what I mean eh - one ends the barrel and they're "easily triggered", anyway the "materials" will be loaded onto the Builders Merchants truck which will then be parked on Lincoln Street, outside the curry house ( quite a nice one actually I have an account there the food is delicious ) where you can go and "steal it". The keys will above the wheel. Usual time, tomorrow 11:25AM.

    Remember, absolute secrecy is required. One false word and all will be blown.

    Yours,

    Commander Jaun Gravy

    PS, this e-mail system of yours is great. All that nonsensical spam you fill it with is bound to throw off the man if he comes a looking. Good work.
  • by SQLGuru ( 980662 ) on Wednesday April 02, 2008 @08:09AM (#22939248) Homepage Journal
    Unless it's a foot race.

    Layne

Top Ten Things Overheard At The ANSI C Draft Committee Meetings: (5) All right, who's the wiseguy who stuck this trigraph stuff in here?

Working...