Can i get some help?
I am making a program in c# that hides strings into images by changing each pixel color to be odd or even so i can store binary data in the pixels without changing the over all look of the image. Its just something i am making for fun but it only seems to work with .bmp's. I want to get it working with .jpg but i dont know how to do this. Right now i am just using System.Drawing.Bitmap to modify the images. Is their any other way that i can do this so it will be compatible with .jpg?
HAHAHA
Image files are bloat.
Real programmers use text/plain, you faggot steganographist.
Name:
FrozenVoid2010-06-28 10:54
>*sad face*
there emoticons for that you know:
u.u , v.v and >.<
__________________
Orbis terrarum delenda est
Name:
Anonymous2010-06-28 11:09
steganography with JPGs
But anyway, according to http://www.faqs.org/faqs/jpeg-faq/part1/section-13.html, even if you'd specify max quality (I believe that the default in .NET is 90% or 95%), the compression is not lossless.
>>1
This idea is rather stupid. For a start not all image formats use pixels, and you could just put the string straight in to the file somewhere (most likely an extension area) with a reasonable understanding of image specification.
>>6
The JPEG specification specifies both lossy and lossless methods of compression. On top of that, nobody said he is making his changes before compression- if you read in to it you could probably figure out some way to get your bits of information stored in what will become the decoded DCT matrix.
>>24 The JPEG specification specifies both lossy and lossless methods of compression.
That's the second time I've heard someone say that. Even if it were true (and it very obviously isn't), no software supports lossless JPEG.
>>25 Even if it were true (and it very obviously isn't) http://www.w3.org/Graphics/JPEG/itu-t81.pdf
Page 132. no software supports lossless JPEG.
It's in the standard- regardless of whether or not OPs ingenious string hiding technique will see widespread adoption. No software supports messages hidden in the parity of pixel data either.
Name:
Anonymous2010-06-28 12:27
>>26
>No software supports messages hidden in the parity of pixel data either.
Although the exact details of what the supposed Russian agents embedded in the pictures, and how they did it, remains classified, the basic technique involves changing the numeric code that computers assign to colors, explained Tal Malkin, an assistant professor in Columbia University's cryptography laboratory.
To generate the picture on a computer screen, the computer assigns every pixel three numeric values that correspond to the amount of red, green or blue in the color the pixel displays. By changing those values ever so slightly, the spies could hide the 1's and 0's of computer language in the picture's pixel numbers, but without altering the picture's appearance to the human eye, Bellovin said.
back to /russia/, please
Name:
Anonymous2010-07-01 10:47
>>34
The cute spy chick[1] was caught because you assholes decided that it's more interesting to troll each other than to help her with her steganography program in C#. Was it worth it?
First off, the authorities don't know to analyze a normal looking picture for secret data, said Malkin. And second, with so many pictures on the Internet, the photos containing hidden messages can hide with the safety of numbers. trollface.txt
Seriously, they don't think that the FBI or NSA or CIA have any way to detect that an image has been edited? Or that they don't have the computing power to scan images? Shit, some random company can come along and make an image search engine like tineye, I'm sure the three-letter agencies have the ability to make a steganography search.
Name:
Anonymous2010-07-01 11:37
>>37 Seriously, they don't think that the FBI or NSA or CIA have any way to detect that an image has been edited? I find it scary to think that the NSA have so much information about information in general that they could actually do this.
(Like what an alleged NSA employee said, that there's a way of distinguishing encrypted and random data)
But then the article says stuff like But back then, it was only a theory.
>>38 (Like what an alleged NSA employee said, that there's a way of distinguishing encrypted and random data) Only idiots aren't able to devise undetectable steganographic methods. They deserve to get caught.
Name:
Anonymous2010-07-01 12:16
>>1
You should be using FrozenVoid's crypteria algorithm.
Sharples Group is a successful, award winning, independent office equipment company based in the North West of England.
We are aware that your office systems are paramount to the future success of your business. The right product, integrated and managed in the right way, can impact positively throughout your business.
We hope you can find all the information you require, however, please do not hesitate to contact us should you have any questions.
Name:
Anonymous2010-07-01 13:56
TOSHIBA CARBON ZERO PROJECT 22/06/2010
SHARPLES ENCOURAGE LOCAL BUSINESSES TO CUT THEIR CARBON FOOTPRINT 17/02/2010
>SHARPLES TURN CYNICAL ACCOUNTANTS TO SUPPORTERS 16/04/2009
SHARPLES GROUP BECOMES A MICROSOFT REGISTERED PARTNER 18/03/2009