A picture
is said to be worth a thousand words. Today, businesses wanting to guard
against the potentially serious hazard of vitally important data being
maliciously leaked to unauthorised people outside or even inside the
organisation, need to get to grips with an alarming reality: a picture can also
conceal a thousand words.
More than enough, at any
rate, to betray all your most precious and commercially sensitive data. You
name it: locations of newly-discovered oil fields; formulae for synthesising
newly-discovered molecules of breakthrough drugs costing millions to develop; designs
of revolutionary products you’re planning on being the first to bring to
market; ultra-sensitive lists of hard-won customers; or whatever else.
Data concealed in pictures? If it
sounds like science-fiction or the basis of a plot sequence in the next Mission Impossible movie, maybe it is.
But unfortunately for organisations, that doesn’t make the threat any less
dangerous.
![]() |
Wax Tablets Used For Writing In Roman Empire |
The technique is called steganography, from the Ancient Greek
words meaning ‘hidden’ or ‘covered’ writing’, just as that lumbering dinosaur
the stegosaurus is so named because its back was covered in those large bony
plates whose real purpose is a mystery even today.
![]() |
Steganographia Published circa 1499 |
But steganography wasn’t a mystery to
the Ancient Greeks; indeed they most likely invented it. The Greek historian
Herodotus records that in 312 BC, Histaeus of Miletus commanded the head of his
most trusted slave to be shaved and tattooed with a vitally important secret
message on it. Once the slave’s hair had grown, hiding the message, Histaeus
used him as an emissary to a friendly power via enemy territory to instigate a
revolt against the Persians.
This example from history shows why
steganographic writing is such a dangerous threat to security. Friends who
betray us are always a more potent threat than people who we recognise as enemies
from the outset, and steganographic messages look friendly and innocent. You
could devise a simple steganographic message by agreeing with your recipient
that your real message will consist
of the first letter of every word of your apparent
message. ‘Bring us your invoice by Monday’, for example, would really mean ‘BUY IBM.’
In steganographic writing the apparent
message is known as the covertext and
the real message is called the plaintext.
The innocuous appearance of the covertext in the example illustrates why
steganographic writing doesn’t tend to set alarm bells ringing. It looks innocent, whereas the message ‘BUY
IBM’ encrypted in a simple code that consisted, say, of substituting each
letter for the next letter in the alphabet - ‘CVZ JCN’ - obviously looks dodgy
and would be certain to awaken the suspicions of even the most credulous member
of an organisation’s industrial espionage prevention team.
The point is that any encrypted
message will tend to raise suspicions
because even though it can’t readily be read you will know it’s been encrypted
and will instantly conclude that something fishy’s going on.
In the highly competitive ocean of
modern business, the threat of steganography has recently become a major issue
in corporate life. It’s been important for several years due to the increased
computing power available on everyone’s desktop, but people have been
distracted by publicity about cryptography and steganography has rather
remained in the background. It’s a particularly worrying threat now because of the
enormous computing power on desktops today, the massive volume of electronic
communications, and the number of freely available tools that allow even a
routine user to employ steganographic techniques.
![]() |
The Film Character Gordon Gekko |
By far the biggest threat is the
potential for concealing steganographic writing within computerised images.
With Windows you can literally drag and drop your hidden text onto a picture
and the deed is done. As Gordon Gekko reminded us in the film Wall Street (1985), the most valuable
commodity of all is information. And it’s precisely that which can so easily be
given away today - or sold - using image-based steganographic techniques.
But what is actually happening when
you carry out what looks like a simple drag and drop?
Closeup Of Pixels On Laptop Screen |
An electronic image is comprised of
thousands of ‘picture elements’ or ‘pixels’. A pixel is a binary number that
provides information on the colour or (in a black and white picture) the shade
of grey that should be displayed in that
particular pixel. The binary number will look something like this: 10011011
etc depending on the pixel in question. The individual numbers (the ‘1’ or the
‘0’) are known as ‘bits’ and the further
along you go to the right the less significant the bits become in defining
the precise colour of the pixel.
The opportunity for steganography
occurs because the less significant bits towards the right can be changed without a significant change to the appearance of
the pixel in the image. Indeed, there will probably not be any discernible
change at all. But every time a bit is changed slightly a piece of data can be
hidden in that changed bit. In a computerised image whose size is 256 by 256
pixels, making a total of 65,536 pixels, there would easily be room to conceal
say, about 5,000 words of data.
Bit twiddling is the most common way to
conceal text within a computerised image. There are many more techniques,
though, particularly when using image formats such as the now ubiquitous ‘jpeg’
which many will have encountered through their digital cameras.
And so an apparently innocuous picture
of - say - an employee’s child’s first day at school taken with a standard
family digital camera could easily be used to conceal a leak that turns out to
be so fatal to the organisation that by the time that school term ends,
thousands of other mums and dads at the business from which the information was
leaked have had to find new jobs - if they can.
What’s the best way to guard against
the hazard of modern image-based steganographic betrayal? The first step is to
recognise that it is a potential
problem and get help to understand what tools are likely to available to a
malicious team member. You also need to know the manner in which these tools
can be used because not only is it hard to find the results of what the tools
do but the tools themselves often leave little trace of their presence – some
are even termed ‘zero footprint’ because they are.
Yet there is some help at hand
because, just as those who have been building the steganography tools have
released them onto the internet, a dedicated team of experts have been making
available tools to help detect hidden messages through the science of
‘steganalysis’. Or perhaps it would be better to call steganalysis an art. The
trouble is that the methods of detecting where and when steganogaphy has been
used tend to rely on statistical techniques, and these by their very nature
deal in probabilities rather than certainty. This means that the detection
tools can, and do, give ‘false positives’. You may accuse a trusted employee of
sending hidden confidential information only to find that it was, after all, only a picture of their child’s first
day at school.
The detection tools need to be used so
that the appropriate steganalysis tool is used in the appropriate situation.
Admittedly, this is not easy, when the range of steganography tools and the
steganalysis counterparts have proliferated and are proliferating just as the
threat from viruses did when they first emerged into the IT environment.
Taking the threat of betrayal by
apparently innocuous pixels seriously will lead you to put into the measures
necessary to defend against it. And you do need to take this threat very
seriously indeed. The stegosaurus may be long extinct, but steganographic
treachery is, unfortunately, here to stay.