Home page logo
/

fulldisclosure logo Full Disclosure mailing list archives

Re: ESFS - The encrypted steganography filesystem
From: stormrider <strmrdr42 () yahoo de>
Date: Thu, 13 Jan 2011 20:24:52 +0100

Hey Tomás,

Am 13.01.2011 19:21, schrieb Tomás Touceda:
Hi stormrider,


What I meant with hide is that, since it uses the LSBs, you can pick
any image, and "find data" in them, so it makes it a little bit harder
to know where you actually have data, and if you really do.


in the document I mentioned (Attacks on Steganographic Systems by 
Andreas Pfitzmann - which you can find here: 
http://www.ece.cmu.edu/~adrian/487-s06/westfeld-pfitzmann-ihw99.pdf)
there is a very good example especially about using the LSB when trying 
to hide data.
What it says about the LSB thing is, that it's a "myth that least 
significant bits are completely random and therefore might be
replaced". Take a look at the windmill image in chapter 3.3 ;-)
I advice you to take a look at that document anyway, which was *the* 
deathblow for steganography in late 90s. It also covers many other stego 
techniques, not only the LSB thing. It is a good starting point if you 
want to get deeper into that topic.
But please, don't be discouraged by my humble opinion. Your project is 
nonetheless interesting and a good thing to learn. And there may be 
other findings about steganography around that I missed.

happy coding,
stormrider

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]
AlienVault