A team of Formosan researchers say they have developed a method acting to camouflage secret military communications in the sounds emitted by sperm whales in an endeavor to help the country ’s bomber avoid detection , reports Hong Kong newspaper of recordSouth China Morning Post(SCMP ) .
In a nutshell , the researchers can edit and embed audio signals into memorialise whale sound , then build a coding organization around these signaling to make them more secure . While the engineering science is new , the construct of shroud secluded messages within a heavy picture is not . Steganographyhas been used since ancient times , such as when Da Vinci painted ahidden codein the Mona Lisa or when British and American armies sent communications usinginvisible inkduring the revolutionary war . In a more modern twist , hackers have taken to the ancient warfare maneuver by hiding malicious codes in benignant software .
In today ’s oceans , submarine reconnaissance systems are always scan and sweeping submerged areas for zep signals , but in the outgrowth they are filtering out the sounds of sperm whales and other marine mammals . Since sperm cell whales arefoundin ocean around the populace , using their sign is a utter Trojan Horse . saw-toothed whales ( Odontocetes ) like sperm whales use echo sounding to hound and navigate in light - divest areas in a like way to how unreasoning bats can “ see ” the world around them ; the sound is emitted from the giant ’s melon vine ( forehead ) and reflects off of object . pigboat apply sound navigation and range ( SONAR ) in the same elbow room , utter pulses of legal waves that reflect off an object and come back to the ship to indicate where a target might be .
Lead researcher Jiang Jiajia say SCMP that submarines can keep their sound pulses and other communications off foeman radars in one of two ways . They can either alter sure audio characteristics that fundamentally sprain them into a hard - to - crack code or send weaker signals that are harder to clean up – both strategies have their downfalls . First , encrypting audio signal could tap off listen enemies who are looking for abnormal phone . On the other hand , weakened signal get weaker as they travel longer distance , create the potentiality of missing their target area .
cryptography , Jiajia say , is advantageous over encoding and other camouflage method acting simply because it does not attract attention . Technology that cypher the substance can further make subaqueous communication more unattackable , so that even if these secret sign are detected , they are more difficult to crack .
However , echo sounding is an extremely sensitive cognitive operation and it ’s not clear how ( or if ) these altered sounds would touch giant universe .
[ H / T : South China Morning Post ]