Stego worm
Tyler Durden
camera_lumina at hotmail.com
Thu Dec 11 17:09:51 PST 2003
Mr Shaddack...
That's some interesting thinking there. The interesting thing is that no one
might ever even notice the presence of this benevolent worm. It could go
pretty much unchecked for a while.
As for Variola's comment, you might be right. I just assumed there's some
kind of relationship between LSB and those spatial freuencies wherein image
information might be stored. Actually, I would still think there's a
relationship, in which case an Echelon-like approach based on ffts and
"noise templates" might be going on (hence the usefulness of jamming).
Anyone got a TLA Operative Handbook? ANy mention in there of what kind of
photos are best for Stego? How about cloud photos? (particularly where there
are clouds of many different shapes and sizes present in the photo
simultaneously.)
-TD
>From: Thomas Shaddack <shaddack at ns.arachne.cz>
>To: cypherpunks <cypherpunks at lne.com>
>Subject: Stego worm
>Date: Fri, 12 Dec 2003 01:10:24 +0100 (CET)
>
>It's unknown to which extent the Adversary can detect presence of
>steganography in images being sent over the Net.
>
>But whatever capabilities they have, they can be jammed.
>
>Imagine a worm that spreads from machine to machine, and on the infected
>machine it finds all suitable JPEG files, generates some random data as
>source and encrypts them with random key, and stegoes them into the files.
>
>In few days or even hours, a sizeable portion of images on the Net
>contains potentially detectable stegoed encrypted data.
>
>Any Chinese want to get immortalized in Internet history?
_________________________________________________________________
Shop online for kids toys by age group, price range, and toy category at
MSN Shopping. No waiting for a clerk to help you! http://shopping.msn.com
More information about the cypherpunks-legacy
mailing list