CRT Steganography

Hide secret messages inside innocent-looking number sequences. The L=11 channel is invisible to anyone who doesn't know the ring. CC0. No patents.

How It Works

The ring Z/970200Z has 5 CRT channels: mod {8, 9, 25, 49, 11}

HIDE:
  1. Choose "carrier" numbers (any sequence — timestamps, prices, IDs)
  2. Decompose each carrier into 5 CRT channels
  3. Replace ONE channel (L=11) with secret data (0-10 per symbol)
  4. Reconstruct via CRT — looks like a normal number in Z/970200Z
  5. The other 4 channels are UNTOUCHED — statistical profile preserved

EXTRACT:
  1. Decompose each number: n mod 11 = secret symbol
  2. Map symbols back to text
  3. Done. No key needed — just know the ring.

WHY IT WORKS:
  - L=11 channel holds log2(11) = 3.46 bits per number
  - The other 4 channels look statistically normal
  - Without knowing it's Z/970200Z, the L=11 data is invisible
  - Corruption detection: if a number is tampered with, CRT cross-check fails

Hide a Message



Stego Numbers (carrier + hidden message)

Orange = contains hidden data. Gray = padding (no data).

-
Numbers in stream
-
Hidden capacity
-

CRT Channel Decomposition

Each number decomposed. The L=11 channel carries the secret.

Extract Hidden Message

Corruption Detection

Modify a stego number. CRT cross-check detects the tampering.

Statistical Invisibility

Compare channel distributions of carrier vs stego numbers. Non-L channels should be identical.

CC0 1.0 Universal - No Rights Reserved. CRT steganography using Z/970200Z = Z/8 x Z/9 x Z/25 x Z/49 x Z/11.
L=11 channel = hidden data channel. Other 4 channels = untouched carrier.
Kills: Digimarc watermarking patents, DRM embedding patents. The ring IS the hiding place.
No patents. No dependencies. No permission needed. antonlebed.com