MISC: steganography & pics
-----BEGIN PGP SIGNED MESSAGE----- Cypherpunks, I too have played around with graphics formats, specifically the TIFF format. It's a large and complicated format, but it does leave room for customization. I just mention this because I'm more familiar with TIFF than the GIF format. Skipping over 99% of the details: the TIFF format has a header (magic numbers and stuff), tags and corresponding information fields, and picture data - real terminology exists, like image file directories and so forth, but I'll skip that. The TIFF format allows you to specify quite a bit of info: information fields such as time of creation, author name, comments, host system; picture information such as rows, columns, whether the minimum value corresponds to black or white; color models: RGB, CMY, CMYK, greyscale; compression model: none, LZW, JPEG; alpha values, and many other fields. Finally, the picture data is stored, non-sequentially if desired (that is, row 1, then row 137, the row 54, etc.) TIFF is extendible by simply defining new tags. Because the TIFF format is so all encompassing, few software packages can read and write the entire thing - that is, valid TIFFs may be created that may not be recognized by other software. Sam Lieffler (sp?) at sgi has written a comprehensive TIFF manipulation package available via anonymous ftp which helps to overcome this problem. Anyway, for steganography purposes, we wouldn't want to define a "crypto" tag obviously! Maybe we could adapt one of the other fields, like host computer or whatever, so that the signal that a TIFFs contains hidden information is that one of the fields has a certain value, to be arranged in advance or whatever. A 256x256 image contains 65536 pixels, each of which could contribute 1 bit to a message, which comes to 8192 bytes (say each pixel is 8 bit and not 24 or something fancy like that), more than enough for a message. This sounds like fun - I imagine in a few weeks there will be a message to the list to retrieve the recently posted image from alt.binaries.pictures.misc and read the hidden message! /-----------------------------------\ | Karl L. Barrus | | elee9sf@menudo.uh.edu | <- preferred address | barrus@tree.egr.uh.edu (NeXTMail) | \-----------------------------------/ -----BEGIN PGP SIGNATURE----- Version: 2.2 iQCVAgUBK6DvpoOA7OpLWtYzAQG1PgP/bI+s4p6kcMkHcv2iR+iJJV9TK32zicos fNOqufuPZvWepfxbEqhsY70RBQAZjuqEhKcjP54yFr7wuDbroFhbfIBMQQLn1znj v5dcaM7GrykNMhR9andfskRG6k72dxlmyBhQRcR3pbhwpPZLdw141yS4VPzHnez7 VgQ9Z+Gsb9s= =qGIH -----END PGP SIGNATURE-----
participants (1)
-
Karl Barrus