Steganography with Flickr 126
yiangocy writes "Steganography
is not something new, there have been techniques and available programs for hiding data in pictures/audio files for a long time now. However, one step further is using popular online photo sharing sites, such as Flickr in hiding your data, successfully."
Never a more apt Message (Score:5, Funny)
Re:Never a more apt Message (Score:2)
Re:Never a more apt Message (Score:2)
not very groundbreaking (Score:5, Interesting)
More interesting projects, though off topic slightly; a method of obscuring your network communications and resolving key issues with stego (though I think the project stopped)
http://www.m-o-o-t.org/ [m-o-o-t.org]
They is also much more interesting uses for stego. in files, hdd slack space and this nice little project 4c.
http://dione.ids.pl/~shykta/ [dione.ids.pl]
4c (or fourcrypt) is a multiple-file steganography program inspired by Michal Zalewski's twocrypt (2c) program, designed to be "subpoena-proof". It supports mixing between one and eight files with independent keys. The files are architecture-independant (tested on x86 and UltraSparc).
Shifting types & saving content to a remote se (Score:5, Interesting)
Also, if part of the point is simply to save non-image file types into a seemingly unlimited Flickr storage space, what happens if you simply change the file extension to something like filename.pdf.jpg and upload that? Does Flickr actually validate file contents?
Re:Shifting types & saving content to a remote (Score:2, Interesting)
Re:Shifting types & saving content to a remote (Score:3, Informative)
Re:Shifting types & saving content to a remote (Score:1)
Flickr doesn't advertise itself as a file backup service.
Re:Shifting types & saving content to a remote (Score:1, Redundant)
Good work Mozilla.org, your software doesn't even know what TELNET is.
Just take out support for everything but HTTP/1.1 and be done with it - you're already on that road, file urls don't work when clicked, gopher gives empty pages, telnet is unknown, just go whole hog., lose ftp, then anything but http, then version 0.9 (if you even support it), then 1.0 (since all the 31337 people use 1.1) then we can get on making it only work with Linux Apache sites
Re:Shifting types & saving content to a remote (Score:4, Informative)
Re:Shifting types & saving content to a remote (Score:1)
Re:Shifting types & saving content to a remote (Score:3, Informative)
New Text Document.txt.jpg was not uploaded: File was not a recognised type or was unable to be decoded (we only support JPEG, PNG, non-animated GIF, BMP and TIFF)
Re:not very groundbreaking (Score:5, Interesting)
How many messages to dormant agents were sent though classified ads like "purple sofa, $145"???
Re:not very groundbreaking (Score:3, Interesting)
using wax tablets in greece.
http://www.jjtc.com/stegdoc/sec202.html [jjtc.com]
"In ancient Greece, text was written on wax covered tablets. In one story Demeratus wanted to notify Sparta that Xerxes intended to invade Greece. To avoid capture, he scraped the wax off of the tablets and wrote a message on the underlying wood. He then covered the tablets with wax again. The tablets appeared to be blank and unused so they passed inspection by sentries without question."
Re:You've just made that up, havn't you? (Score:2)
Yawn indeed (Score:2)
Not exactly hidden, but pretty safe and has been going on for years.
Re:Oh Great (Score:2)
What should and will happen is that the millions of pairs of eyes browing Flickr may notice something odd and they should "report it" (to whom is another question - I can't see my local PD being the slightest bit interested in "a cute looking dog that may contain encrypted data that may be plans for a terrorist attack"
Re:Oh Great (Score:1, Insightful)
For once, "Anonymous Coward" is very fitting!
Seriously, do you want to live the rest of your life in a carboard box because it's
Re:Oh Great (Score:2)
Actually, this is just another step towards proving that information wants to be free. If enough accounts embed enough bogus files into enough places, who's to stop any of this? you can hide information in images, code, etc - zillions of file formats.
And in fact, this is what people said about any public access to data storage. The internet is full of enough buckets to hide stuff - amd those buckets are dynamic enough - that no single agency or entity is going to find all of it.
Re:Oh Great (Score:2, Funny)
Only terrorists would use it to get information out like proof that GW bush knew there was no WMD's. or a secret Oval office taping that has "... I don't care the cost in american lives, I need to get saddam for daddy! You do not disrespect a bush! and he said bad things about my mommy..." or maybe those secret laws that are passed that you can not even be told about... Yes only TERRORISTS would get that information out so that the populace knew the tr
Re:Oh Great (Score:1)
Re:Oh Great (Score:1)
Re:Oh Great (Score:1)
Re:Oh Great (Score:2)
The only and best use I can think of for that would be for paranoid right-wingers planning to take away all my freedoms in a futile attempt to soothe their own fear, when in fact of course they by so doing will only feed it. Given the current climate I'd say this is pretty much happening for sure.
I hope park wardens are keeping an eye out
Gmail? (Score:1)
Wouldn't it be a lot easier to send the images to a gmail account?
--
Dreamhost [dreamhost.com] superb hosting.
Kunowalls!!! [kunowalls.host.sk] Random sexy wallpapers.
Re:Gmail? - Use 'em both! (Score:2)
Flikr (Yahoo!) supports bulk uploads - the whole process could be easily scripted, ditto gmail. So this issue is: who do you feel will be around for the long term? Heck - double up your backups and store data on gmail and>/b flikr.
Re:Gmail? (Score:3, Informative)
Re:Gmail? (Score:3, Informative)
Re:Gmail? (Score:2)
Re:Gmail? (Score:3, Funny)
From: Joe
To: Michelle
Subject: No stego here
<attachment: cutedoggy.jpg>
Adwords by Gooooooogle
Terrorists are using the Internet to send secret information.
www.paranoia.gov
Can't find your WMDs? Buy some more
www.dod.gov
Suspicious emails? Let us examine them
www.noprivacy.gov
Looking for Cute Doggies?
www.sexwithcutedogs.com
I'm against this (Score:2, Interesting)
So basically they're showing you how to use a photo storage service to store private data. I think this is immoral and is probably against the terms of service.
Flikr could probably detect the changes anyway. When you do stego on Jpegs you do it by altering the coefficients on the waveforms. The problem is these coefficients usually conform to a gaussian distribution and by packing so much data in to the jpeg you're going to screw up that distribution.
To hide truly undetectable data in there is going
Re:I'm against this (Score:5, Funny)
I'm Sorry, the posting you just made is against the Slashdot posting terms.
We believe you are a terrorist trying to hide data within your non-conformist post text.
After a detailed analysis of the contents of your posting, the waveform coeficients do not conform to standard slashdot thinking, more precisely, your posting failed to contain the phrases "first post", "in soviet russia" or "hot grits".
Please remove the hidden message and try again.
Re:I'm against this (Score:1)
It depends, doesn't it. If the hidden data is a picture, I don't think it's against the terms.
Re:I'm against this (Score:1, Informative)
The only real "term of service" worth reading is "We reserve the right to refuse service to anyone for any reason at any time." Everything else in that document is just preamble, really.
My guess is it comes down to how much they care.
Not to mention (Score:1)
Ok, you can password protect it, but how good is stego in that? If gets really interesting to see if that is hackable.
Re:Not to mention (Score:2)
Programs like Steghide [sourceforge.net] (the one used in the article) need the correct passphrase to even detect the existence of hidden data. Enter a wrong passphrase, and Steghide will tell you there is no embedded data.
Re:Not to mention (Score:2)
Not 100% correct, you can use a program called StegDetect [outguess.org] which will give a probability of hidden data in a file, this has been very useful for me in the past
Re:I'm against this (Score:2, Insightful)
Re:I'm against this (Score:5, Informative)
Rather than worry about trying to detect stegnography, any image posting service could just arbitrarily set all of the least significant bits of jpgs to "1" as part of the image posting process. It might slightly degrade the image, but it would also erase any potential encoded messages.
Not really, the best stego packages use error correcting codes to help mitigate this kind of attack. Some stego packages don't work by using the LSB but by swapping adjacent pixels. The cleaning of the LSB would have no real impact on this type of stego.
Simon
Re:I'm against this (Score:2)
Not really, the best stego packages use error correcting codes to help mitigate this kind of attack. Some stego packages don't work by using the LSB but by swapping adjacent pixels. The cleaning of the LSB would have no real impact on this type of stego.
Sounds right to me. I wrote a stego app that just modifies bitmaps in a very obvious way [sourceforge.net], and it would certainly be defeated/corrupted by changing some of the bits (in fact, that's why I didn't feel qualms about posting it), but some of the the best open [freshmeat.net]
Re:I'm against this (Score:2)
Re:I'm against this (Score:2)
How about if they ran it through an image filter like "sharpen" or "unsharp mask"?
I couldn't tell you exactly how they work but I know there are algorithms that can maintain the integrity of the data even when the image is resized, cropped, sharpened, blurred etc.
Broadly, they work by changing more visible aspected of the image that aren't easily destroyed by these operations. The technology is used extensively in digital watermarking, where the watermark must survive all kinds of abuse.
Unfortuan
Re:I'm against this (Score:3, Informative)
Why would this be immoral? There has been a lot of noise about possibly violating the TOS but has anyone actually bothered reading them? (There are two, one for pre-Yahoo! accounts and one [yahoo.com] for Flickr after aquisition by Yahoo!--which everyone will be required to abide in 2006.)
Both TOS say pretty much the same thing. You are responsible for y
Wonderful... (Score:1)
but they ARE images (Score:2)
again? (Score:4, Informative)
owell, its probably goatse now, you guys should just put (NSFW) after all wikipedia links.
Re:again? (Score:2)
You could say the same about google linking to it...
There's a nonzero chance that it'll be a page full of links to porn sites.. if you don't want to risk it don't click on links to wikis.
Re:again? (Score:4, Insightful)
Besides the usual trolling, there is some truth in the parent.
Maybe just put a link to the (then current) revision, and not to the general article? That way, everybody will get the same article that excisted before the
I forgot: (Score:2)
Re:I forgot: (Score:2)
I just corrected some spelling.
Re:again? (Score:1)
nothing to do with Flickr (Score:5, Insightful)
Yaaaawn, -1: misleading.
Re:Upon reflection... (Score:1)
So THAT'S where the WMD are... (Score:5, Funny)
stegnography in Mona Lisa (Score:5, Funny)
Da Vinci was a terrorist (Score:1)
Re:Da Vinci was a terrorist (Score:1)
Probably won't work (Score:1)
Re:Probably won't work (Score:2)
Re:Probably won't work (Score:2, Informative)
http://www.flickr.com/help/photos/#89 [flickr.com]
Re:Probably won't work (Score:1)
Same with Photobucket [photobucket.com] free. As of about 6 months ago you could upload any file and it wouldn't be resampled unless it exceeded 250kB. I never actually did a binary comparison to test if it was exactly the same though.
Obviously you could get bigger photo sizes with paid accounts, and obviously it created a lot of resampled (downsized) products too. You could always get the full size one though.
Hiding in the spam (Score:4, Insightful)
Re:Hiding in the spam (Score:1)
Re:Hiding in the spam (Score:2)
Steganography?? (Score:1, Funny)
Movie Plot Vulnerability (Score:5, Insightful)
This is a general "this can be used by terrists!" freak-out. Well, you know, this is an awfully stupid and ineffective way to pass information -- something Bruce Schneier likes to call "movie plot" vulnerabilities. Why bother with steganography when there are much better means to pass encrypted data between two people? Like, I don't know, DCC'ing a file over IRC, or just plain sending an email? If you own both the sending and receiving servers, or use one of the infected army of the drones, there is a miniscule chance of your message even being observed in the ocean of the information that is the internet. Much less stupid than using a complex routine to hide data in an image, and then upload it to a central service like Flickr for all to see (it shows up immediately in the "recently uploaded" pool).
This is a fine idea for a movie plot, but utterly dumb for someone to actually try this. Thus, I assign the article a -1 Troll.
Re:Movie Plot Vulnerability (Score:3, Interesting)
If you own both the sending and receiving servers, or use one of the infected army of the drones, there is a miniscule chance of your message even being observed in the ocean of the information that is the internet.
Notice the word 'if'. If you *do not* own both the sending and receiving servers the story is different. For instance if you do not know where your agents are, who they are or when they are on line. The GIA once used an open for all mailing list (or was it usenet?) on football to send orders
Re:Movie Plot Vulnerability (Score:2)
A direct connection, on the other hand, provides a handy place in which to
Re:Movie Plot Vulnerability (Score:2)
How could I not mention this story in my first post. It was your posting that reminded me of it:
A couple of years ago a Dutch blackmailer [interesting-people.org] hid the ransom payment by steganography on an extremely busy public website. Of course police checked all the weblogs, and traced the one entry that had gone thro
hiding data in html! (Score:1, Offtopic)
Re:hiding data in html! (Score:2)
Obviously though, spelling steganography is much more difficult.
Re:hiding data in html! (Score:2)
Poor excuse for a talking point (Score:1)
But why Flickr? (Score:1)
Another great job (Score:1)
missing the point (Score:1)
A much better solution (Score:4, Funny)
Re:A much better solution (Score:1)
Steganography in recent fiction (Score:5, Interesting)
Warning: this novel is a demanding read. It is a higher-brow---and markedly dystopian---treatment of the same themes as Neil Stephensen's Cryptonomicon. In writing it, Mr. Scholz seems to have received considerable help from insiders at the national laboratories.
With luck, the following link to Google Print will show you a sample page that is reasonably representative of the entire book.
http://print.google.com/print?id=kVP7pIA9TYUC&pg=P A382&lpg=PA382&dq=steganography&prev=http://www.go ogle.com/search%3Fclient%3Dsafari%26rls%3Den-us%26 q%3DRadiance%26ie%3DUTF-8%26oe%3DUTF-8&sig=-uyML9j p9G4JsUZOCa59fPI6YpM [google.com]
we need humint, not sigint (Score:3, Insightful)
The too-often referenced 9/11 attack was not a failure of signals intelligence. Secret services whose job it is to capture communications did their job in this regard.
Information was not translated and/or acted upon.
Getting more sigint will lead to a panopticon society, without actually resolving the fundamental problem of our lack of human intelligence.
Re:we need humint, not sigint (Score:3, Insightful)
Amen!
In spite of all efforts to thwart the creation of the 9-11 Commission, and then to stonewall on making available government files regarding "who knew what, and when" to the Commission, the truth slowly but surely does surface eventually. Not only did the FBI have information on some of the 9-11 highjackers taking commercial aviation flight instruction pre-9-11, but it also turns out that DoD intelligence had pinp
This "threat" is as old as...stegosauri (Score:2)
it's image security (Score:2)
Stegdetect (Score:3, Interesting)
I played around with steganography at one time and setup a script to create embed images [fea.net] via the web using Outguess [outguess.org]
We wrote filters over at Fotopic (Score:2)
It wasn't uncommon for us to get a 200x200 jpeg which was about 10M in size, and find RAR headers in it. Given the volume of photos submitted it's a bit hard to scan everything but we score it and it works 99% of the time.
Of course, there's the pillocks who'll upload a photo called "w
Big Deal. MS-Office does this and more. (Score:1)
So what? I can bloat a file with no visible benefit? Been doing that for years.
Clippy: "It looks like you're trying to cram 24kb of text into a 3.2Mb
Re:Easily detected: (Score:1)
Steganography works by encoding data within visible pixels.
Re:Hiding more than one message? (Score:3, Interesting)