[extropy-chat] Re: codes in scam letters
mail at harveynewstrom.com
mail at harveynewstrom.com
Tue Sep 27 14:23:49 UTC 2005
If done correctly, steganography can theoretically be undetectable.
However, in practice, it is almost never done so well.
In the real world, image programs leave signatures inside the picture data
so you can tell what program created the image. Often, this is explicitly
stated within a tag that gives the program name, version, date, etc.
Otherwise, the internal structure of the graphic can be analyzed to identify
the original program. The programs also contain compression signatures that
indicate what level of compression and what algorithms were used to reduce
the image size. Again, this is often explicitly stated in a tag within the
picture, or can be reverse-engineered by examining the internal structure of
the compression.
What this means is that it is trivial for a person to grab the image binary
off the net, load it into the indicated program, and save it with the same
compression level and method indicated. This should produce the exact same
binary, because all the structures, formatting and compression should
already be exactly as that program and compression combination would produce
them. There should be no noise or randomness that has not already been
optimized away. If there is any change in the image when doing this, it
indicates that the changed bits were tweaked after the original picture was
produced and were not a natural product of the imaging software. These
changed bits can then be isolated, extracted, and analyzed separately from
the overall image information.
Thus, it is trivial in most cases to extract and analyze any random bits
introduced to the imaging after processing. Using this method, we can
confirm that the vast majority of the pictures posted on the net are free
from hidden messages. One would have to use a non-standard or unknown
graphics format with zero or non-standard compression to produce images with
messages hidden in them. Such a format could be detected as unusual.
--
Harvey Newstrom <www.HarveyNewstrom.com>
CISSP CISA CISM CIFI NSA-IAM GSEC ISSAP ISSMP ISSPCS IBMCP
More information about the extropy-chat
mailing list