04 Jun '14 19:04>
http://phys.org/news/2014-06-covert-channel-internet.html
Originally posted by sonhouseYes. It's terrible how they are doing everything the Americans [and British]
Yes, well the Chinese just got caught with their hands in the cookie jar, didn't they?
Originally posted by DeepThoughtWell this forum tends to be a bit on the slow side... which is why having
I did read the article. The idea that you can alter the gaps in the message with suitable hardware so that a hidden message is still readable really is clever. To defend against it networks could simply reset the gaps to a standard length by default, thereby wiping any hidden message.
I've got to admit my main motivation in posting here is to push t ...[text shortened]... he list. It's depressing that they are the only threads anyone can think of anything to say in.
Originally posted by moonbusAll images are (basically) bitmaps, JPEG and GIF refer to compression algorithms. Stenography won't work with JPEGs because they use lossy compression, so either the JPEG won't be uncompressible, rendering the image file suspicious, or the message will be clobbered by the compression algorithm. You could do it with GIFs though as that is a lossless compression algorithm. This does require both the sender and the receiver having copies of the original image the message is put into.
"Steganography" is the generic word for the technique of hiding a message inside another message.
See for example:
http://www.strangehorizons.com/2001/20011008/steganography.shtml
http://www.garykessler.net/library/steganography.html
The hidden message can be encoded as spaces (inter-frame gaps) or unused bits in tcp headers, or alpha channels i ...[text shortened]... hat in itself would be suspicious, but the principle could be applied to JPEGs or PNGs I'm sure.
Originally posted by DeepThoughtYou can erase the need for a reference picture by using a reversible algorithm
All images are (basically) bitmaps, JPEG and GIF refer to compression algorithms. Stenography won't work with JPEGs because they use lossy compression, so either the JPEG won't be uncompressible, rendering the image file suspicious, or the message will be clobbered by the compression algorithm. You could do it with GIFs though as that is a lossless com ...[text shortened]... s suspicious at the cost of greatly reducing the size of sendable message per megabyte of image.
Originally posted by moonbusYes, and this is my problem with this atm.
"Steganography" is the generic word for the technique of hiding a message inside another message.
See for example:
http://www.strangehorizons.com/2001/20011008/steganography.shtml
http://www.garykessler.net/library/steganography.html
The hidden message can be encoded as spaces (inter-frame gaps) or unused bits in tcp headers, or alpha channels i ...[text shortened]... hat in itself would be suspicious, but the principle could be applied to JPEGs or PNGs I'm sure.
Originally posted by googlefudgeI don't understand how the reversibility of the algorithm will help. I suppose one could simply overwrite the least significant bit of every byte rather than xor-ing, so that the message can simply be read, and thus avoid having to use a reference image. But that would be vulnerable to message detection, since after compression and encryption the message to be hidden would be expected to be similar to a random sequence of bits, but in an image there should be regions where the is a high probability that the least significant bits of neighbouring pixels have the same value. I wouldn't trust that system against a professional cryptographer.
You can erase the need for a reference picture by using a reversible algorithm
to encode the message. Then you only need to know the algorithm used and any
picture can be used to hide the message.
Also, I still mainly use bitmaps. Storage is cheap. 😉