FOCUS

Hiding Secrets in Spontaneous Patterns

Physics 4, 96
A new, secure way to send messages camouflages them inside the same kind of self-organizing patterns that appear in vegetation patterns and the stripes on animal coats.
L. Saunoriene & M. Ragulskis, Phys. Rev. E (2011)
Hiding in plain sight. To hide the picture, a dot-skeleton version (top) is embedded in a noisy grayscale image and then allowed to diffuse into self-organizing patterns according to the equations of a predator-prey model. The image that results (middle) can only be decoded by rerunning the algorithm with the original noisy image and taking the difference (bottom).

Embedding secret information in a seemingly ordinary image is one of the latest tricks in the world of cloak and dagger. A new technique for concealing messages in computer-generated images, described in Physical Review E, uses the mathematics of so-called pattern forming systems, such as spots on animals or the natural geographic clustering of vegetation. The encoded image is a random-looking mixture of stripes or dots that cannot be “unscrambled” by computer analysis because of the special properties of this class of equations. The technique’s inventors say their system could be the basis for highly secure communications in certain situations, but some experts in this field doubt the technique would be applicable in real covert operations.

The strategy of hiding messages in ordinary objects is called steganography. The advantage over cryptography is that it protects the sender and receiver by concealing the fact that communication is going on. Historical examples include messages written in invisible ink and secrets shrunken down into “microdots” that can replace periods in printed text. In today’s digital world, a message can be embedded in an image by modifying some of the ones and zeros in the binary code that assigns colors to the pixels. A human eye cannot detect the modification, but “steganalysis” programs often can, for example, by detecting a deviation in the usual statistical distribution of pixel shades.

To increase the security of digital image steganography, Loreta Saunoriene and Minvydas Ragulskis of Kaunas University of Technology in Lithuania explored whether the physics of self-organizing patterns could be used to better conceal messages. Self-organizing patterns were first observed in chemical reactions in which the chemical species spread out in a nonuniform way, forming stripes, spirals or other geometrical shapes. Similar patterns have been discovered in other so-called nonlinear systems, such as predator-prey interactions, where the patterns represent the clustering of animal species into specific regions.

In their new technique, Saunoriene and Ragulskis use a particular algorithm from predator-prey models to diffuse, or “blur out,” an image so that it would be almost impossible to detect, even by image processing software. The researchers start with a noisy grayscale image—resembling the static or “snow” on an analog TV—that they generate with a mathematical formula. They then embed a secret message or picture by slightly brightening specific pixels to a degree that is imperceptible within the noise. Next, the researchers transform the image using repeated application of the predator-prey equations. Each iteration of the algorithm causes the information in the brightened pixels to diffuse outward. The diffusion is nonlinear, which means that the original pixel values can’t be retrieved by somehow reversing the diffusion process. As the pattern of irregular stripes and dots emerges, the original image is smoothed out to such an extent that a steganalysis program could detect nothing, Ragulskis says.

To decode the squiggly pattern, the recipient first generates the same noisy, “static” image and applies the same algorithm to it (all this math agreed upon in advance with the sender). Similar patterns form but without any message embedded inside. The recipient then subtracts this “blank template” pixel-by-pixel from the encoded image to get a blurry—but readable—version of the secret message.

Jessica Fridrich from the State University of New York in Binghamton thinks this is a “fascinating” idea, but the encoded images aren’t ordinary enough to avoid attention. “Unless most of us attach similar patterns to our emails (for some unknown reason), I would mark as potentially suspicious any email with such a pattern,” Fridrich says. Zoran Duric of George Mason University in Fairfax, Virginia, agrees and adds that messages based on low-resolution pictures or text have limited data capacity. Ragulskis counters that in some situations, transferring large amounts of data is not required—the point is to prevent others from recognizing that the pattern contains a secret message, even if they find it suspicious. The nonlinear algorithm wipes away any trace of hidden information, he says.

–Michael Schirber

Michael Schirber is a Corresponding Editor for Physics Magazine based in Lyon, France.

More Information


Subject Areas

Nonlinear Dynamics

Related Articles

Time Delays Improve Performance of Certain Neural Networks
Computational Physics

Time Delays Improve Performance of Certain Neural Networks

Both the predictive power and the memory storage capability of an artificial neural network called a reservoir computer increase when time delays are added into how the network processes signals, according to a new model. Read More »

The Neuron vs the Synapse: Which One Is in the Driving Seat?
Complex Systems

The Neuron vs the Synapse: Which One Is in the Driving Seat?

A new theoretical framework for plastic neural networks predicts dynamical regimes where synapses rather than neurons primarily drive the network’s behavior, leading to an alternative candidate mechanism for working memory in the brain. Read More »

Nonreciprocal Frustration Meets Geometrical Frustration
Nonlinear Dynamics

Nonreciprocal Frustration Meets Geometrical Frustration

New theoretical work establishes an analogy between systems that are dynamically frustrated, such as glasses, and thermodynamic systems whose members have conflicting goals, such as predator–prey ecosystems. Read More »

More Articles