Intelligent Machines

Hiding in Plain Sight

Software screens digital images for secret messages.

In the weeks after the September 11 terror attacks, reports surfaced that terrorists might have communicated with each other through messages embedded in images posted on the Web. So far, no such hidden communications have been confirmed publicly, but intelligence agencies are certainly keen on finding them if they exist. To aid in the search, a computer scientist at the State University of New York at Binghamton has developed a way to screen digital images for evidence of hidden content.

Binghamton’s Jessica Fridrich says her algorithms examine the numbers that encode color in pixels, the colored or gray dots that make up an image. When an image conceals information-say, a 15-page text file-the numbers that encode its pixel colors are changed slightly. While the human eye can’t see the resulting color changes, Fridrich’s algorithms can detect statistical anomalies in the underlying numbers. In most kinds of image files, Fridrich’s tool can detect the signatures of a number of concealment-or “steganography”-programs, all widely shared in the hacker subculture. Cryptographers must then decode any images that have been altered.

Fridrich delivered the first version of the software to her U.S. Air Force sponsors last year. “What they do with it, I’m not allowed to know. We can only assume the government is somehow using it,” she says.

This story is part of our April 2002 Issue
See the rest of the issue
Subscribe

“Her work is first rate,” says computer scientist Rafael Alonso, technical director of Web informatics at Princeton, NJ-based Sarnoff. But the software requires investigators to make preliminary guesses about which Web sites might harbor images with hidden messages. In the future, says Alonso, to narrow the range of images to scan, algorithms like Fridrich’s might be combined with search engine software capable of “shining a flashlight in the sewers of the Web”-dredging obscure sites like personal pages and classified ads that are presumably attractive for covert communications.

Fridrich predicts “sharp competition in the next few years” from other approaches to ferreting out hidden messages. Security won’t come easy, though. Information could be stashed in video and music files as well as photos, for example. Still, Fridrich’s tools mark an important first step toward finding pictures that contain thousands of words.

Become an MIT Technology Review Insider for in-depth analysis and unparalleled perspective.

Subscribe today

Uh oh–you've read all of your free articles for this month.

Insider Premium
$179.95/yr US PRICE

More from Intelligent Machines

Artificial intelligence and robots are transforming how we work and live.

Want more award-winning journalism? Subscribe to Insider Basic.
  • Insider Basic {! insider.prices.basic !}*

    {! insider.display.menuOptionsLabel !}

    Six issues of our award winning magazine and daily delivery of The Download, our newsletter of what’s important in technology and innovation.

    See details+

    What's Included

    Bimonthly magazine delivery and unlimited 24/7 access to MIT Technology Review’s website

    The Download: our daily newsletter of what's important in technology and innovation

/
You've read all of your free articles this month. This is your last free article this month. You've read of free articles this month. or  for unlimited online access.