Coded Messages:

2019 ◽  
pp. 53-112
Keyword(s):  
Author(s):  
Der-Chyuan Lou ◽  
Jiang-Lung Liu ◽  
Hao-Kuan Tso

Information-hiding technology is an ancient art and has existed for several centuries. In the past, messages could easily be intercepted because there was no technology of secret communication. Hence, a third party was able to read the message easily. This was all changed during 440 B.C., that is, the Greek Herod’s era. The Greek historian Herodotus in his writing of histories stated that Demaratus was the first person who used the technique of information hiding. Demaratus, a Greek who lived in Persia, smuggled a secret message to Sparta under the cover of wax. The main intent was to warn Sparta that Xerxes, king of Persia, was planning an invasion on Greece by using his great naval fleet. He knew it would be very difficult to send the message to Sparta without it being intercepted. Hence, he came up with the idea of using a wax tablet to hide the secret message. In order to hide the secret message, he removed all the wax from the tablet, leaving only the wood underneath. He then wrote the secret message into the wood and recovered the tablet with the wax. The wax covered his message to make the wax tablet look like a blank one. Demaratus’ message was hidden and never discovered by the Persians. Hence, the secret message was sent to Sparta successfully. Greece was able to defeat the invading Persians by using the secret message. Another example of information hiding was employed by another Greek named Histaiaeus. Histaiaeus wanted to instigate a revolt against the Persian king and had to deliver a secret message about the revolt to Persia. He came up with the shaved-head technique. Histaiaeus decided to shave the head of his most trusted slave and then tattooed the secret message on his bald scalp. When the hair grew back, the secret message was covered, and then Histaiaeus ordered the slave to leave for Persia. When the slave reached his destination, his head was shaved, showing the secret message to the intended recipient. Around 100 A.D., transparent inks made it into the secret field of information hiding. Pliny discovered that the milk of the thithymallus plant could easily be used as transparent ink. If a message was written with the milk, it would soon evaporate and left no residue. It seemed that the message was completely erased. But once the completely dried milk was heated, it would begin to char and turned to a brown color. Hence, the secret message could be written on anything that was not too flammable. The reason it turned brown was because the milk was loaded with carbon, and when carbon was heated, it tended to char. Information hiding became downfallen and won no respect until World Wars I and II. Invisible inks, such as milk, vinegar, fruit juices, and urine, were extensively used during the wars. All of them would darken when they were heated. The technology was quite simple and noticeable. Furthermore, World War II also brought about two inventions of new technologies. The first one was the invention of the microdot technology. The microdot technology was invented by the Germans to convey secret messages to their allies. The microdot was basically a highly detailed picture shrunk to about the size of a period or dot, which permitted hiding large amounts of data into the little microdot. By using a microscope, the hidden message would be revealed. The Germans would put their dots into their letters, and they were almost undetectable to the naked eye. The other technology was the use of open-coded messages. For open-coded messages, certain letters of each word were used to spell out the secret message. Open-coded messages used normal words and messages to write the buffer text that hid the message. Because they seemed normal, they often passed the check of security. For example, the following message was a common example of open-coded messages and was actually sent by a German spy during World War II. Apparently neutral’s protest is thoroughly discounted and ignored. Isman hard hit. Blockade issue affects pretext for embargo on by-products, ejecting suets and vegetable oils. By extracting the second letter in each word, the secret message was revealed: Pershing sails from NY June 1. This technique was effective because it could pass through the check of security and was easy for someone to decode (Johnson, Duric, & Jajodia, 2001; Katzenbeisser & Petitcolas, 2000; Schaefer, 2001). The technologies mentioned here are different ways of information hiding in different eras. With the development of computer technology, it is becoming hard for the third party to discover the secret message.


1998 ◽  
Vol 91 (3) ◽  
pp. 240-244
Author(s):  
Dennis St. John

Throughout history, coded messages have been used for various reasons. Today's students are fascinated by the secretive nature of these codes, and this fascination can lead them to explore the mathematics of cryptography. The simplest codes are called substitution ciphers. In these codes, each letter is replaced by another number or letter in the alphabet. These codes are easy to crack, or decode, because of the relative frequency of letters in messages. For example, e is the most often used letter in the English language; therefore, the substituted value for e is relatively easy to determine. One way to make substitution codes more difficult to crack is to group letters and then encode the groups of letters. A particular application of this strategy, one that combines matrix multiplication and modular arithmetic, is known as the Hill cipher (Anton and Rorres 1987). This article explains coding and decoding messages using Hill ciphers. These ciphers are an interesting example of an application of matrices called for in NCTM's Curriculum and Evaluation Standards for School Mathematics (NCTM 1989) for grades 9-12. A graphing calculator will facilitate the matrix and modular arithmetic used in the coding and decoding procedures.


2017 ◽  
Vol 21 (9) ◽  
pp. 1945-1948 ◽  
Author(s):  
Jessica Claridge ◽  
Ioannis Chatzigeorgiou
Keyword(s):  

2021 ◽  
Vol 6 (1) ◽  
Author(s):  
N. Chandra Wickramasinghe ◽  
◽  
Gensuke Tokoro ◽  
Robert Temple ◽  
◽  
...  

It is proposed that the future trajectory of SETI (Search for Extraterrestrial Intelligence) and our exploration of alien planets and alien intelligence could be to consider the possibility of receiving and transmitting coded messages embedded as DNA inserts in bacteria and/or viruses. Physical space-travel and ambitions of space colonisation may well give way to a new era of “cultural” microbial colonisation of our galaxy.


2021 ◽  
Vol 1208 (1) ◽  
pp. 012034
Author(s):  
Azra Vojić ◽  
Edin Mujčić ◽  
Una Drakulić

Abstract With the development of modern technology, smartphones have become a necessity for most people. Among other uses, mobile phones are increasingly being used in smart home systems. In smart homes, mobile phones are used to remotely control and monitor various systems such as simply turning on/off lights and household appliances, various monitoring systems, etc. Nowadays, sending coded messages or pressing application buttons is increasingly being avoided in process of developing smart systems. More and more frequently is used voice commands. The system which uses voice commands for remote control and monitoring smart home is described in this paper. In the implemented system, the user is able, using specific voice commands to remotely control the operation of various appliances in his home. An Android application was designed to control the implemented system. Using the designed Android application, the user controls the desired home devices with specific voice commands. Also, on the designed Android application are buttons that the user can use, in case the user’s voice is not recognized in the implemented system. For experimental work analysis, the model of the home is made with lights and different home appliances inside. The results of the experimental work analysis of the implemented system show this system is very simple to use and very efficient. Also, the latest technology for remote control and monitor smart systems is applied in the proposed smart home system.


1991 ◽  
Vol 112 ◽  
pp. 205-212
Author(s):  
A. R. Thompson

The Radiodetermination Satellite Service (RDSS) provides radiolocation and limited communication for users of aeronautical, marine and terrestrial vehicles. A system of the RDSS is being developed in the United States by the Geostar Corporation (Rothblatt, 1988). In this system signals from a control center are transmitted to transceivers on users’ vehicles through one of a series of two or three satellites spaced along the geostationary orbit, and responses are received through each of these satellites. If three satellites are used, locations of vehicles can be determined from the measured times of transmission from the control center to the user and back via different satellite paths. If two satellites are used the timing data must be supplemented by information such as altitude data from a terrain map, or an altimeter reading from the user’s vehicle, which can be encoded in the response transmitted back. Computation of the vehicle location is performed at the control center. The equipment at the vehicle can be relatively simple since its basic function is that of a transponder, and intervention by the vehicle operator is not necessarily required. However, provision can also be made for the inclusion of short coded messages from the vehicle, so the unit on the vehicle is usually referred to as a transceiver. The system is designed to meet the needs of various users; for example, trucking companies which must periodically monitor the locations of vehicles in a widely distributed fleet. Position information can be relayed to the company headquarters as well as to the vehicle operator. The role played by the central control computer in determining the locations requires that all vehicles using the service identify themselves by a transmitted code. Thus developers and operators of RDSS systems can lease their services to vehicle users.


Gone Home ◽  
2018 ◽  
pp. 103-130
Author(s):  
Karida L. Brown

Within the confines of their segregated social world, black children became aware of the color line at a very young age through racially coded messages, but also through taken-for-granted practices and institutions. This chapter traces the transformation in the black community along the grain of the civil rights movement through a close reading of the rise and fall of one of the institutions most beloved by the black community in Harlan County, Kentucky—the colored school. Brown shows how the black segregated school institutionalized and reproduced racial ideologies within the community. At the same time, she demonstrates how the colored school was a proud site of black cultural expression.


2003 ◽  
Vol 49 (5) ◽  
pp. 1355-1363 ◽  
Author(s):  
S. Konstantinidis ◽  
S. Perron ◽  
L.A. Wilcox-O'Hearn

Sign in / Sign up

Export Citation Format

Share Document