Mr Shaddack...

That's some interesting thinking there. The interesting thing is that no one might ever even notice the presence of this benevolent worm. It could go pretty much unchecked for a while.

As for Variola's comment, you might be right. I just assumed there's some kind of relationship between LSB and those spatial freuencies wherein image information might be stored. Actually, I would still think there's a relationship, in which case an Echelon-like approach based on ffts and "noise templates" might be going on (hence the usefulness of jamming).

Anyone got a TLA Operative Handbook? ANy mention in there of what kind of photos are best for Stego? How about cloud photos? (particularly where there are clouds of many different shapes and sizes present in the photo simultaneously.)

-TD


From: Thomas Shaddack <[EMAIL PROTECTED]>
To: cypherpunks <[EMAIL PROTECTED]>
Subject: Stego worm
Date: Fri, 12 Dec 2003 01:10:24 +0100 (CET)

It's unknown to which extent the Adversary can detect presence of
steganography in images being sent over the Net.

But whatever capabilities they have, they can be jammed.

Imagine a worm that spreads from machine to machine, and on the infected
machine it finds all suitable JPEG files, generates some random data as
source and encrypts them with random key, and stegoes them into the files.

In few days or even hours, a sizeable portion of images on the Net
contains potentially detectable stegoed encrypted data.

Any Chinese want to get immortalized in Internet history?

_________________________________________________________________
Shop online for kids� toys by age group, price range, and toy category at MSN Shopping. No waiting for a clerk to help you! http://shopping.msn.com




Reply via email to