JED - October 2012 - (Page 47)

EW 101 Spectrum Warfare – Part 18 Steganography By Dave Adamy S teganography is defi ned as “hidden writing,” and has been around for centuries. However, with the advent of digital communication, it has taken on a whole new life. If you look up steganography on your web browser, you will get many evenings of entertainment; including detailed history, theory, countermeasures, and available software products to implement and detect it. As usual with this kind of subject, we will focus on its utility in electronic and information warfare and particularly on its applicability to spectrum warfare. STEGANOGRAPHY VS. ENCRYPTION This comparison is analogous to the difference between transmission security and message security in transmitted signal paths. When we use spread spectrum techniques, particularly highlevel direct-sequence spread spectrum (DSSS), the signal received by an enemy who does not have access to the pseudorandom spreading code is “noise like.” That is, the signal appears to be only a slight increase in the noise level in the direction of the transmitter. Thus, without special equipment and techniques, an enemy will not even be able to detect that a transmission has taken place. On the other hand, encryption keeps an enemy from being able to recover the information sent. The spread spectrum modulation provides transmission security, which prevents an enemy from locating and attacking the transmitter. Encryption is also required because it keeps the enemy from learning our secrets after sophisticated means are used to detect the signal. (See Figure 1.) Steganography deals directly with the information we are sending – either by hard copy or electronic means. It covers our secret messages with seemingly unrelated data, as shown in Figure 2; so an enemy will not even know that we are conducting important (typically military) communication. This, in effect, provides transmission security. Encryption has the same function as above – protecting our information if the enemy discovers our hidden messages. However, an encrypted message displays random letters or bits – making it obvious that we are hiding something. This tells the enemy that we are communicating important information, and may trigger an effort to analyze and ultimately recover our information. Steganography, if successful, will deny the enemy this operational advantage. The Journal of Electronic Defense | October 2012 EARLY STEGANOGRAPHIC TECHNIQUES One early technique discussed in some articles was to shave the head of a messenger, tattoo a message on his bald head, and let his hair grow back. His head was then shaved to recover the message. Other techniques have included writing innocuous messages in which some pattern of letters scattered through the message contained the hidden information. There was also the use of micro-dots and invisible inks in seemingly innocent written communication. One particularly interesting approach (in a WWII spy movie) was to 47 ENCRYPTOR MESSAGE SECURITY TRANSMISSION SECURITY DECRYPTOR SPREADING MODULATOR XMTR SPREADING DEMODULATOR RCVR Figure 1: Spread spectrum communication provides transmission security, while encryption provides message security. http://www.crows.org

Table of Contents for the Digital Edition of JED - October 2012

The View From Here
Conferences Calendar
Courses Calendar
From the President
The Monitor
Washington Report
World Report
Pacing the Anti-Ship Missile Threat
Cognition: EW Gets Brainy
Inside IEWS
EW 101
AOC News
Index of Advertisers
JED Quick Look

JED - October 2012

https://www.nxtbook.com/naylor/JEDM/JEDM0318
https://www.nxtbook.com/naylor/JEDM/JEDM0218
https://www.nxtbook.com/naylor/JEDM/JEDM0118
https://www.nxtbook.com/naylor/JEDM/JEDM1217
https://www.nxtbook.com/naylor/JEDM/JEDM1117
https://www.nxtbook.com/naylor/JEDM/JEDM1017
https://www.nxtbook.com/naylor/JEDM/JEDM0917
https://www.nxtbook.com/naylor/JEDM/JEDM0817
https://www.nxtbook.com/naylor/JEDM/JEDM0717
https://www.nxtbook.com/naylor/JEDM/JEDM0617
https://www.nxtbook.com/naylor/JEDM/JEDM0517
https://www.nxtbook.com/naylor/JEDM/JEDM0417
https://www.nxtbook.com/naylor/JEDM/JEDM0317
https://www.nxtbook.com/naylor/JEDM/JEDM0217
https://www.nxtbook.com/naylor/JEDM/JEDM0117
https://www.nxtbook.com/naylor/JEDM/JEDM1216
https://www.nxtbook.com/naylor/JEDM/JEDM1116
https://www.nxtbook.com/naylor/JEDM/JEDM1016
https://www.nxtbook.com/naylor/JEDM/JEDM0916
https://www.nxtbook.com/naylor/JEDM/JEDM0816
https://www.nxtbook.com/naylor/JEDM/JEDM0716
https://www.nxtbook.com/naylor/JEDM/JEDM0616
https://www.nxtbook.com/naylor/JEDM/JEDM0516
https://www.nxtbook.com/naylor/JEDM/JEDM0416
https://www.nxtbook.com/naylor/JEDM/JEDM0316
https://www.nxtbook.com/naylor/JEDM/JEDM0216
https://www.nxtbook.com/naylor/JEDM/JEDM0116
https://www.nxtbook.com/naylor/JEDM/JEDM1215
https://www.nxtbook.com/naylor/JEDM/JEDM1115
https://www.nxtbook.com/naylor/JEDM/JEDM1015
https://www.nxtbook.com/naylor/JEDM/JEDM0915
https://www.nxtbook.com/naylor/JEDM/JEDM0815
https://www.nxtbook.com/naylor/JEDM/JEDM0715
https://www.nxtbook.com/naylor/JEDM/JEDM0615
https://www.nxtbook.com/naylor/JEDM/JEDM0515
https://www.nxtbook.com/naylor/JEDM/JEDM0415
https://www.nxtbook.com/naylor/JEDM/JEDM0315
https://www.nxtbook.com/naylor/JEDM/JEDM0215
https://www.nxtbook.com/naylor/JEDM/JEDM0115
https://www.nxtbook.com/naylor/JEDM/JEDM1214
https://www.nxtbook.com/naylor/JEDM/JEDM1114
https://www.nxtbook.com/naylor/JEDM/JEDM1014
https://www.nxtbook.com/naylor/JEDM/JEDM0914
https://www.nxtbook.com/naylor/JEDM/JEDM0814
https://www.nxtbook.com/naylor/JEDM/JEDM0714
https://www.nxtbook.com/naylor/JEDM/JEDM0614
https://www.nxtbook.com/naylor/JEDM/JEDM0514
https://www.nxtbook.com/naylor/JEDM/JEDM0414
https://www.nxtbook.com/naylor/JEDM/JEDM0314
https://www.nxtbook.com/naylor/JEDM/JEDM0214
https://www.nxtbook.com/naylor/JEDM/JEDM0114
https://www.nxtbook.com/naylor/JEDM/JEDM1213
https://www.nxtbook.com/naylor/JEDM/JEDM1113
https://www.nxtbook.com/naylor/JEDM/JEDM1013
https://www.nxtbook.com/naylor/JEDM/JEDM0913
https://www.nxtbook.com/naylor/JEDM/JEDM0813
https://www.nxtbook.com/naylor/JEDM/JEDM0713
https://www.nxtbook.com/naylor/JEDM/JEDM0613
https://www.nxtbook.com/naylor/JEDM/JEDM0513
https://www.nxtbook.com/naylor/JEDM/JEDM0413
https://www.nxtbook.com/naylor/JEDM/JEDM0313
https://www.nxtbook.com/nxtbooks/naylor/JEDM0213
https://www.nxtbook.com/nxtbooks/naylor/JEDM0113
https://www.nxtbook.com/nxtbooks/naylor/JEDM1212
https://www.nxtbook.com/nxtbooks/naylor/JEDM1112
https://www.nxtbook.com/nxtbooks/naylor/JEDM1012
https://www.nxtbook.com/nxtbooks/naylor/JEDM0912
https://www.nxtbook.com/nxtbooks/naylor/JEDM0812
https://www.nxtbook.com/nxtbooks/naylor/JEDM0712
https://www.nxtbook.com/nxtbooks/naylor/JEDM0612
https://www.nxtbook.com/nxtbooks/naylor/JEDM0512
https://www.nxtbook.com/nxtbooks/naylor/JEDM0412
https://www.nxtbook.com/nxtbooks/naylor/JEDM0312
https://www.nxtbook.com/nxtbooks/naylor/JEDM0212
https://www.nxtbook.com/nxtbooks/naylor/JEDM0112
https://www.nxtbook.com/nxtbooks/naylor/JEDM1211
https://www.nxtbook.com/nxtbooks/naylor/JEDM1111
https://www.nxtbook.com/nxtbooks/naylor/JEDM1011
https://www.nxtbook.com/nxtbooks/naylor/JEDM0911
https://www.nxtbook.com/nxtbooks/naylor/JEDM0811
https://www.nxtbook.com/nxtbooks/naylor/JEDM0711
https://www.nxtbook.com/nxtbooks/naylor/JEDM0611
https://www.nxtbook.com/nxtbooks/naylor/JEDM0511
https://www.nxtbook.com/nxtbooks/naylor/JEDM0411
https://www.nxtbook.com/nxtbooks/naylor/JEDM0311
https://www.nxtbook.com/nxtbooks/naylor/JEDM0211
https://www.nxtbook.com/nxtbooks/naylor/JEDM0111
https://www.nxtbook.com/nxtbooks/naylor/JEDM1210
https://www.nxtbook.com/nxtbooks/naylor/JEDM1110
https://www.nxtbook.com/nxtbooks/naylor/JEDM1010
https://www.nxtbook.com/nxtbooks/naylor/JEDM0910
https://www.nxtbook.com/nxtbooks/naylor/JEDM0810
https://www.nxtbook.com/nxtbooks/naylor/JEDM0710
https://www.nxtbook.com/nxtbooks/naylor/JEDM0610
https://www.nxtbook.com/nxtbooks/naylor/JEDM0510
https://www.nxtbook.com/nxtbooks/naylor/JEDM0410
https://www.nxtbook.com/nxtbooks/naylor/JEDM0310
https://www.nxtbook.com/nxtbooks/naylor/JEDM0210
https://www.nxtbook.com/nxtbooks/naylor/JEDM0110
https://www.nxtbook.com/nxtbooks/naylor/JEDM1209
https://www.nxtbook.com/nxtbooks/naylor/JEDM1109
https://www.nxtbook.com/nxtbooks/naylor/JEDM1009
https://www.nxtbook.com/nxtbooks/naylor/JEDM0909
https://www.nxtbook.com/nxtbooks/naylor/JEDM0809
https://www.nxtbook.com/nxtbooks/naylor/JEDM0709
https://www.nxtbook.com/nxtbooks/naylor/JEDM0609
https://www.nxtbook.com/nxtbooks/naylor/JEDM0509
https://www.nxtbook.com/nxtbooks/naylor/JEDM0409
https://www.nxtbook.com/nxtbooks/naylor/JEDM0309
https://www.nxtbook.com/nxtbooks/naylor/JEDM0209
https://www.nxtbook.com/nxtbooks/naylor/JEDM0109
https://www.nxtbook.com/nxtbooks/naylor/JEDM0908
https://www.nxtbookmedia.com