Steganography

Complex Voter ID Algorithm in Ohio Counties Reveals Potential for Covert Data Classification

Abstract:

This paper presents evidence of algorithmic manipulation in Ohio voter registration databases through a Modulo 8-based deterministic numbering scheme embedded in County ID assignments. This is the third state reviewed in a survey of twelve. Analysis of County ID gap frequency distributions reveals that Franklin, Lucas, and Montgomery counties employ sophisticated mathematical structures in ID number assignment that is absent in Ohio’s other 85 counties. The structures manifest in cyclical Modulo-8 patterns in gap frequency distributions, forming precise mathematical relationships that cannot result from standard operations. This implementation exemplifies what information warfare doctrine defines as a ‘subliminal channel’—a steganographic mechanism enabling hidden communication within critical electoral infrastructure. Such capabilities could permit targeted manipulation of voter records without detection, representing a significant vulnerability in democratic systems.

The Caesar Cipher and Stacking the Deck in New York State Voter Rolls

Abstract:

Voters in New York State are identified by two identification numbers. This study has discovered strong evidence that both numbers have been algorithmically manipulated to produce steganographically concealed record attribute information. One of the several algorithms discovered has been solved. It first utilizes a mechanism nearly identical to the simple ‘Caesar Cipher’ to change the order of a group of ID numbers. Then, it interlaces them the way a deck of cards is arranged to create a ‘stacked deck’. The algorithmic modifications create hidden structure within voter ID numbers. The structure can be used to covertly tag fraudulent records for later use.

Analysis and Categorical Application of LSB Steganalysis Techniques

ABSTRACT

Many tools and methods for steganalysis are prevalent in the research field. While no technique is 100% effective, combining multiple techniques is common practice. Techniques reliant on the same basis are often found to be less computationally efficient when used in combination as opposed to the combined use of techniques in separate categories. It is the goal of this paper to present many of the foundational techniques, explore their strengths and weaknesses, categorize the techniques, and present further theories on the combinational effectiveness of techniques within and outside of those categories.

Journal of Information Warfare

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

Keywords

A

AI
APT

C

C2
C2S
CDX
CIA
CIP
CPS

D

DNS
DoD
DoS

I

IA
ICS

M

P

PDA

S

SOA

X

XRY

Quill Logo

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

SUBSCRIBE NOW

Get in touch

Registered Agent and Mailing Address

  • Journal of Information Warfare
  •  ArmisteadTEC
  • Dr Leigh Armistead, President
  • 1624 Wakefield Drive
  • Virginia Beach, VA 23455

 757.510.4574

 JIW@ArmisteadTec.com