{"id":5238,"date":"2023-03-15T12:45:19","date_gmt":"2023-03-15T09:15:19","guid":{"rendered":"https:\/\/www.icad.com\/?p=5238"},"modified":"2024-11-26T11:35:13","modified_gmt":"2024-11-26T08:05:13","slug":"new-steganography-breakthrough-enables-perfectly-secure-digital-communications","status":"publish","type":"post","link":"https:\/\/www.icad.com\/new-steganography-breakthrough-enables-perfectly-secure-digital-communications\/","title":{"rendered":"New Steganography Breakthrough Enables \u201cPerfectly Secure\u201d Digital Communications"},"content":{"rendered":"<section id=\"bt_bb_section69ccf61936182\"  class=\"bt_bb_section bt_bb_layout_boxed_1200\" ><div class=\"bt_bb_port\"><div class=\"bt_bb_cell\"><div class=\"bt_bb_cell_inner\"><div class=\"bt_bb_row \"  data-bt-override-class=\"{}\"><div class=\"bt_bb_row_holder\" ><div  class=\"bt_bb_column col-xxl-8 col-xl-8 col-xs-12 col-sm-12 col-md-12 col-lg-8 bt_bb_vertical_align_top bt_bb_align_left bt_bb_padding_normal\" style=\"; --column-width:8;\" data-width=\"8\" data-bt-override-class=\"{}\"><div class=\"bt_bb_column_content\"><div class=\"bt_bb_column_content_inner\"><div  class=\"bt_bb_text\" ><\/p>\n<div class=\"btArticleContent \">\n<div class=\"bt_bb_wrapper\">\n<p><img decoding=\"async\" loading=\"lazy\" class=\"alignnone wp-image-5239\" src=\"https:\/\/i0.wp.com\/www.icad.com\/wp-content\/uploads\/2023\/03\/New-Steganography-Breakthrough-Enables-Perfectly-Secure-Digital-Communications.webp?resize=722%2C465&#038;ssl=1\" alt=\"\" width=\"722\" height=\"465\" srcset=\"https:\/\/i0.wp.com\/www.icad.com\/wp-content\/uploads\/2023\/03\/New-Steganography-Breakthrough-Enables-Perfectly-Secure-Digital-Communications.webp?resize=640%2C412&amp;ssl=1 640w, https:\/\/i0.wp.com\/www.icad.com\/wp-content\/uploads\/2023\/03\/New-Steganography-Breakthrough-Enables-Perfectly-Secure-Digital-Communications.webp?resize=768%2C494&amp;ssl=1 768w, https:\/\/i0.wp.com\/www.icad.com\/wp-content\/uploads\/2023\/03\/New-Steganography-Breakthrough-Enables-Perfectly-Secure-Digital-Communications.webp?resize=320%2C206&amp;ssl=1 320w, https:\/\/i0.wp.com\/www.icad.com\/wp-content\/uploads\/2023\/03\/New-Steganography-Breakthrough-Enables-Perfectly-Secure-Digital-Communications.webp?w=975&amp;ssl=1 975w\" sizes=\"(max-width: 722px) 100vw, 722px\" data-recalc-dims=\"1\" \/><\/p>\n<p style=\"text-align: justify;\">A group of researchers from University of Oxford and Carnegie Mellon University has developed a breakthrough algorithm in secure communications using steganography, which involves hiding sensitive information inside of innocuous content. The algorithm can conceal sensitive information so effectively that it cannot be detected that something has been hidden, making it a useful tool in digital human communications such as social media and private messaging. The researchers believe that the algorithm\u2019s ability to send perfectly secure information could empower vulnerable groups such as dissidents, investigative journalists, and humanitarian aid workers.<\/p>\n<p>This may have strong implications for information security, besides further applications in data compression and storage.<\/p>\n<\/div>\n<\/div>\n<div class=\"btArticleShareEtc\">\n<div class=\"btShareColumn\">\n<div class=\"bt_bb_icon btIcoFacebook bt_bb_style_filled bt_bb_size_xsmall bt_bb_shape_circle bt_bb_text_empty\"><\/div>\n<\/div>\n<\/div>\n<p>\n<\/div><\/div><\/div><\/div><div  class=\"bt_bb_column col-xxl-4 col-xl-4 col-xs-12 col-sm-12 col-md-12 col-lg-4 bt_bb_vertical_align_top bt_bb_align_left bt_bb_padding_normal\" style=\"background-color:rgb(239,239,239);; --column-width:4;\" data-width=\"4\" data-bt-override-class=\"{&quot;bt_bb_align_&quot;:{&quot;current_class&quot;:&quot;bt_bb_align_left&quot;,&quot;def&quot;:&quot;left&quot;,&quot;xl&quot;:&quot;left&quot;}}\"><div class=\"bt_bb_column_content\"><div class=\"bt_bb_column_content_inner\"><div class=\"bt_bb_separator bt_bb_border_style_none bt_bb_top_spacing_30\" data-bt-override-class=\"null\"><\/div><header class=\"bt_bb_headline bt_bb_dash_none bt_bb_size_inherit bt_bb_align_inherit\"><h5><span class=\"bt_bb_headline_content\"><span>OUR SERVICES<\/span><\/span><\/h5><\/header><div class=\"bt_bb_custom_menu bt_bb_direction_vertical bt_bb_font_weight_bold\"><div class=\"menu-our-services-container\"><ul id=\"menu-our-services\" class=\"menu\"><li id=\"menu-item-2785\" class=\"menu-item menu-item-type-custom menu-item-object-custom menu-item-2785\"><a href=\"https:\/\/www.icad.com\/construction\/\">Construction<\/a><\/li>\n<li id=\"menu-item-2793\" class=\"menu-item menu-item-type-custom menu-item-object-custom menu-item-2793\"><a href=\"https:\/\/www.icad.com\/airport-operation-systems\/\">Airport Operation Systems<\/a><\/li>\n<li id=\"menu-item-2787\" class=\"menu-item menu-item-type-custom menu-item-object-custom menu-item-2787\"><a href=\"https:\/\/www.icad.com\/mechanical\/\">Mechanical<\/a><\/li>\n<li id=\"menu-item-2789\" class=\"menu-item menu-item-type-custom menu-item-object-custom menu-item-2789\"><a href=\"https:\/\/www.icad.com\/plumbing\/\">Plumbing<\/a><\/li>\n<li id=\"menu-item-2788\" class=\"menu-item menu-item-type-custom menu-item-object-custom menu-item-2788\"><a href=\"https:\/\/www.icad.com\/electrical\/\">Electrical<\/a><\/li>\n<li id=\"menu-item-2786\" class=\"menu-item menu-item-type-custom menu-item-object-custom menu-item-2786\"><a href=\"https:\/\/www.icad.com\/infrastructure\/\">Infrastructure<\/a><\/li>\n<li id=\"menu-item-2790\" class=\"menu-item menu-item-type-custom menu-item-object-custom menu-item-2790\"><a href=\"https:\/\/www.icad.com\/information-communication-technology\/\">Information Communication Technology<\/a><\/li>\n<li id=\"menu-item-2792\" class=\"menu-item menu-item-type-custom menu-item-object-custom menu-item-2792\"><a href=\"https:\/\/www.icad.com\/security-systems\/\">Security Systems<\/a><\/li>\n<li id=\"menu-item-2794\" class=\"menu-item menu-item-type-custom menu-item-object-custom menu-item-2794\"><a href=\"https:\/\/www.icad.com\/emerging-technoiogies\/\">Emerging Technologies<\/a><\/li>\n<li id=\"menu-item-2799\" class=\"menu-item menu-item-type-custom menu-item-object-custom menu-item-2799\"><a href=\"https:\/\/www.icad.com\/air-navigation-systems\/\">Air Navigation Systems<\/a><\/li>\n<li id=\"menu-item-2791\" class=\"menu-item menu-item-type-custom menu-item-object-custom menu-item-2791\"><a href=\"https:\/\/www.icad.com\/safety-systems\/\">Safety Systems<\/a><\/li>\n<li id=\"menu-item-2795\" class=\"menu-item menu-item-type-custom menu-item-object-custom menu-item-2795\"><a href=\"https:\/\/www.icad.com\/building-controls-automation-systems\/\">Building Controls &#038; Automation Systems<\/a><\/li>\n<li id=\"menu-item-2797\" class=\"menu-item menu-item-type-custom menu-item-object-custom menu-item-2797\"><a href=\"https:\/\/www.icad.com\/intelligent-transportation-systems\/\">Intelligent Transportation Systems<\/a><\/li>\n<li id=\"menu-item-2798\" class=\"menu-item menu-item-type-custom menu-item-object-custom menu-item-2798\"><a href=\"https:\/\/www.icad.com\/audio-visual-systems\/\">Audio Visual Systems<\/a><\/li>\n<li id=\"menu-item-2796\" class=\"menu-item menu-item-type-custom menu-item-object-custom menu-item-2796\"><a href=\"https:\/\/www.icad.com\/maritime-technologies\/\">Maritime Technologies<\/a><\/li>\n<\/ul><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":5239,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[52],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.0 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>New Steganography Breakthrough Enables \u201cPerfectly Secure\u201d Digital Communications - ICAD<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.icad.com\/new-steganography-breakthrough-enables-perfectly-secure-digital-communications\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"New Steganography Breakthrough Enables \u201cPerfectly Secure\u201d Digital Communications - ICAD\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.icad.com\/new-steganography-breakthrough-enables-perfectly-secure-digital-communications\/\" \/>\n<meta property=\"og:site_name\" content=\"ICAD\" \/>\n<meta property=\"article:published_time\" content=\"2023-03-15T09:15:19+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-11-26T08:05:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.icad.com\/wp-content\/uploads\/2023\/03\/New-Steganography-Breakthrough-Enables-Perfectly-Secure-Digital-Communications.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"975\" \/>\n\t<meta property=\"og:image:height\" content=\"627\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"Icad_admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Icad_admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.icad.com\/new-steganography-breakthrough-enables-perfectly-secure-digital-communications\/\",\"url\":\"https:\/\/www.icad.com\/new-steganography-breakthrough-enables-perfectly-secure-digital-communications\/\",\"name\":\"New Steganography Breakthrough Enables \u201cPerfectly Secure\u201d Digital Communications - ICAD\",\"isPartOf\":{\"@id\":\"https:\/\/www.icad.com\/#website\"},\"datePublished\":\"2023-03-15T09:15:19+00:00\",\"dateModified\":\"2024-11-26T08:05:13+00:00\",\"author\":{\"@id\":\"https:\/\/www.icad.com\/#\/schema\/person\/879bd8df6331c2871e1424bc8d1a868f\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.icad.com\/new-steganography-breakthrough-enables-perfectly-secure-digital-communications\/#breadcrumb\"},\"inLanguage\":\"en\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.icad.com\/new-steganography-breakthrough-enables-perfectly-secure-digital-communications\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.icad.com\/new-steganography-breakthrough-enables-perfectly-secure-digital-communications\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.icad.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"New Steganography Breakthrough Enables \u201cPerfectly Secure\u201d Digital Communications\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.icad.com\/#website\",\"url\":\"https:\/\/www.icad.com\/\",\"name\":\"ICAD\",\"description\":\"A Global Technology Corporation\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.icad.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.icad.com\/#\/schema\/person\/879bd8df6331c2871e1424bc8d1a868f\",\"name\":\"Icad_admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\/\/www.icad.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5ed03d3eec1eaace5bd173172c073058?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5ed03d3eec1eaace5bd173172c073058?s=96&d=mm&r=g\",\"caption\":\"Icad_admin\"},\"sameAs\":[\"http:\/\/icad.com\"],\"url\":\"https:\/\/www.icad.com\/author\/icad_admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"New Steganography Breakthrough Enables \u201cPerfectly Secure\u201d Digital Communications - ICAD","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.icad.com\/new-steganography-breakthrough-enables-perfectly-secure-digital-communications\/","og_locale":"en_US","og_type":"article","og_title":"New Steganography Breakthrough Enables \u201cPerfectly Secure\u201d Digital Communications - ICAD","og_url":"https:\/\/www.icad.com\/new-steganography-breakthrough-enables-perfectly-secure-digital-communications\/","og_site_name":"ICAD","article_published_time":"2023-03-15T09:15:19+00:00","article_modified_time":"2024-11-26T08:05:13+00:00","og_image":[{"width":975,"height":627,"url":"https:\/\/www.icad.com\/wp-content\/uploads\/2023\/03\/New-Steganography-Breakthrough-Enables-Perfectly-Secure-Digital-Communications.webp","type":"image\/webp"}],"author":"Icad_admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Icad_admin","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.icad.com\/new-steganography-breakthrough-enables-perfectly-secure-digital-communications\/","url":"https:\/\/www.icad.com\/new-steganography-breakthrough-enables-perfectly-secure-digital-communications\/","name":"New Steganography Breakthrough Enables \u201cPerfectly Secure\u201d Digital Communications - ICAD","isPartOf":{"@id":"https:\/\/www.icad.com\/#website"},"datePublished":"2023-03-15T09:15:19+00:00","dateModified":"2024-11-26T08:05:13+00:00","author":{"@id":"https:\/\/www.icad.com\/#\/schema\/person\/879bd8df6331c2871e1424bc8d1a868f"},"breadcrumb":{"@id":"https:\/\/www.icad.com\/new-steganography-breakthrough-enables-perfectly-secure-digital-communications\/#breadcrumb"},"inLanguage":"en","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.icad.com\/new-steganography-breakthrough-enables-perfectly-secure-digital-communications\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.icad.com\/new-steganography-breakthrough-enables-perfectly-secure-digital-communications\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.icad.com\/"},{"@type":"ListItem","position":2,"name":"New Steganography Breakthrough Enables \u201cPerfectly Secure\u201d Digital Communications"}]},{"@type":"WebSite","@id":"https:\/\/www.icad.com\/#website","url":"https:\/\/www.icad.com\/","name":"ICAD","description":"A Global Technology Corporation","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.icad.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en"},{"@type":"Person","@id":"https:\/\/www.icad.com\/#\/schema\/person\/879bd8df6331c2871e1424bc8d1a868f","name":"Icad_admin","image":{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/www.icad.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/5ed03d3eec1eaace5bd173172c073058?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5ed03d3eec1eaace5bd173172c073058?s=96&d=mm&r=g","caption":"Icad_admin"},"sameAs":["http:\/\/icad.com"],"url":"https:\/\/www.icad.com\/author\/icad_admin\/"}]}},"jetpack_featured_media_url":"https:\/\/i0.wp.com\/www.icad.com\/wp-content\/uploads\/2023\/03\/New-Steganography-Breakthrough-Enables-Perfectly-Secure-Digital-Communications.webp?fit=975%2C627&ssl=1","_links":{"self":[{"href":"https:\/\/www.icad.com\/wp-json\/wp\/v2\/posts\/5238"}],"collection":[{"href":"https:\/\/www.icad.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.icad.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.icad.com\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.icad.com\/wp-json\/wp\/v2\/comments?post=5238"}],"version-history":[{"count":6,"href":"https:\/\/www.icad.com\/wp-json\/wp\/v2\/posts\/5238\/revisions"}],"predecessor-version":[{"id":5245,"href":"https:\/\/www.icad.com\/wp-json\/wp\/v2\/posts\/5238\/revisions\/5245"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.icad.com\/wp-json\/wp\/v2\/media\/5239"}],"wp:attachment":[{"href":"https:\/\/www.icad.com\/wp-json\/wp\/v2\/media?parent=5238"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.icad.com\/wp-json\/wp\/v2\/categories?post=5238"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.icad.com\/wp-json\/wp\/v2\/tags?post=5238"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}