Introduction and Goals

Social/Ethical Issues

Background

Project Details

Evaluation and Conclusion

References

Social and Ethical Issues of Steganography

A lot of the current controversy surrounding steganography can be characterized in terms of tension between government, industry and individuals. There are two main reasons for this. Firstly, the publishing and broadcasting industries have become interested in techniques for hiding encrypted copyright marks and serial numbers in digital films, audio recordings, books and multimedia products; an interest in new market opportunities created by digital distribution which is coupled with a fear that digital works could be too easy to copy.

Secondly, moves by various governments in the past and present to restrict the availability of encryption services has motivated people to study methods by which private messages can be embedded in seemingly innocuous cover messages. The ease with which this can be done may be an argument against imposing restrictions.

Powerful encryption tools are widely available to people all around the world, and there seems to be nothing that can stop these technologies from spreading, to innocent, security conscious individuals and criminals alike. From the government's point of view, the availability of strong encryption methods to the general public is a threat to public security and safety; terrorists and criminals can communicate freely, since the officials do not have any possibility of decrypting or, in the case of steganography, even detecting these digital messages. Therefore, there are initiatives in the U.S. and in Europe that intend to preserve the law-enforcement and signal-intelligence capabilities of governmental agencies by restricting the import, export and use of these powerful security tools, or by requiring that they include "back doors" that would allow law enforcement agencies to decrypt and read these encrypted messages at will.

One of the main drawbacks of using encryption is that when you see an encrypted message you know that it's an encrypted message. If someone captures a network data stream or an e-mail that is encrypted, the mere fact that the data is encrypted might raise suspicion. The person monitoring the traffic may investigate why and use various tools to try to figure out the message's contents. In other words, encryption provides confidentiality but not secrecy. With steganography, however, the information is hidden, and someone looking at a .jpg image, for instance, wouldn't be able to determine if there's any information within the image. So hidden information could be right in front of our eyes, and we wouldn't see it. It is possible to combine steganography and encryption by first encrypting the data and then using steganography to hide it. This two-step process adds additional security. If someone manages to figure out the steganographic system used, he wouldn't be able to read the data he extracted because it's encrypted.

This makes governments and law enforcement agencies very nervous. One of the disadvantages of using plain encryption was that it is relatively easy to monitor who is talking to whom, when, how and so forth. For example, if a known drug-dealer is sending encrypted messages to someone not yet under suspicion, the implications are pretty clear. But with steganography, law enforcement officials aren't even sure there are messages being passed back and forth. For example, if two people decided to communicate without alerting others that they were in fact communicating they might do so by mean of a public forum that allows postings of pictures, such as USENET. The entire public exchange between the two people is completely inconspicuous and virtually untraceable.

In the wake of 9/11, officials suspected that the terrorists may have been communicating using images of items that were put up for auction on eBay. With Ebay being such a high volume site, this made it an ideal medium of communication in that the ability to monitor who visited what page is very difficult. Also, due to the large number of images on the site it would be practically impossible to scan all images that are submitted to the site for steganographic content. And even then, there is no assurance that you have detected all the modified images.

During the Second World War, message detection was improved on while new technologies were developed which could pass more information and be even less conspicuous. The Germans developed microdot technology that FBI Director J. Edgar Hoover referred to as "the enemy's masterpiece of espionage." Microdots are photographs the size of a printed period having the clarity of standard-sized typewritten pages. The first microdots were discovered masquerading as a period on a typed envelope carried by a German agent in 1941. The message was not hidden, nor encrypted. It was just so small as to not draw attention to itself (for a while). Besides being so small, microdots permitted the transmission of large amounts of data including drawings and photographs.

With many methods being discovered and intercepted, the Office of Censorship took extreme actions such as banning flower deliveries which contained delivery dates, crossword puzzles and even report cards as they can all contain secret messages. Censors even went as far as rewording letters and replacing stamps on envelopes.

One might be tempted to think that such a thing would no longer happen in our free speech centered, liberal world, but consider this. After video tapes of Bin Laden were released to the media, the US government prohibited the public airing of the tapes out of fear that they would contain hidden messages to his followers.

Other applications for steganography include the automatic monitoring of radio advertisements, where it would be convenient to have an automated system to verify that adverts are played as contracted; indexing of video mail, where one may want to embed comments in the content; and medical safety, where current image formats such as DICOM separate image data from the text (such as the patient's name, date and physician), with the result that the link between image and patient occasionally gets mangled by protocol converters. Thus embedding the patient's name in the image could be a useful safety measure.

Where the application involves the protection of intellectual property, we may distinguish between watermarking and fingerprinting. In the former, all the instances of an object are marked in the same way, and the object of the exercise is either to signal that an object should not be copied, or to prove ownership in a later dispute. One may think of a watermark as one or more copyright marks that are hidden in the content. With fingerprinting, on the other hand, separate marks are embedded in the copies of the object that are supplied to different customers. The effect is somewhat like a hidden serial number: it enables the intellectual property owner to identify customers who break their license agreement by supplying the property to third parties.

In one system we encountered, a specially designed cipher enables an intellectual property owner to encrypt a film soundtrack or audio recording for broadcast, and issue each of his subscribers with a slightly different key; these slight variations cause imperceptible errors in the audio decrypted using that key, and the errors identify the customer. The system also has the property that more than four customers have to collude in order to completely remove all the evidence identifying them from either the keys in their possession or the audio that they decrypt. Using such a system, a subscriber to a music channel who posted audio tracks to the Internet, or who published his personal decryption key there, could be rapidly identified. The content owner could then either prosecute, revoke the key, or both.

With just these few examples we can see that the uses of steganography are wide and varied; ranging from legitimate personal privacy to product control, from patient confidentiality to corresponding between terrorist. It is easy to overlook the good in the face of the overwhelming fear that is aroused when faced with the possibility of yet another 9/11. However, that does not mean this tool should be banned or restricted. Indeed, with the rapid deployment of anything placed on the internet, any attempt to do so would be futile, perhaps detrimental, and would prevent those in industry and academia from perusing research in this field, research in such things as detection and extraction. That, seemingly, is the logical conclusion, but with government the logical conclusion isn't necessarily the one that is acted on.

[ Back ] [ Next ]