'B. R. 'BeAr' Ederson' wrote, in part:
| Not necessarily so. The reason for significant changes within the picture
| would be the compression by another algorithm and/or another compression
| factor rather than the overall brightness change.
_____
The overall 'brightness' change propagates thru the recompression, even
reusing the same compression process with the same compression factor.
There are many filters that will do the same.
My suggestion is for a simple change to an image that would destroy
executable code, not a generalized method for defeating steganography.
You describe the beginning of an arms race, which I brought up my subsequent
reply to 'Art'.
Phil Weldon
message | On Sun, 25 Jun 2006 01:25:38 GMT, Phil Weldon wrote:
|
| > Try an image editor and change the overall 'brightness by 1%. That
should
| > destroy any executable hidden in a .jpg image.
|
| Not necessarily so. The reason for significant changes within the picture
| would be the compression by another algorithm and/or another compression
| factor rather than the overall brightness change.
|
| If you try your suggestion on an image twice in a row to ensure the same
| compression settings, you'll find large portions of the images 2 and 3
| unchanged. Most of the data may shift position. But a trigger program
| can look for code snippets to get the offset of the malicious code. It
| doesn't need to depend on exact positions. If AV programs always used
| brightness changes to "disinfect" *.jpg files, virus writers would just
| place the code in the chrominance part of the data stream. (Luminance
| and chrominance are compressed separately in *jpg files.)
|
| Moreover, all JFIF (JPEG File Interchange Format) files comprise of
| several data blocks/streams. Besides using IPTC/EXIF metadata fields
| it may be not to hard a task to construct blocks neither visible nor
| changed by usual picture handling. That's the kind of pictures Art
| targets when he talks about heuristic detection of suspicious files.
| (If I get him right.) I, too, would be glad, if AV programs would
| issue a warning about data files containing seemingly executable
| code within text header fields or additional data streams.
|
| Btw.: There is currently some research on the topic, how data of
| pictures has to be manufactured to survive lossy transformation:
|
|
http://research.binghamton.edu/faculty/fridrich/fridrich.htm
|
| Though the focus of the research of Jessica Fridrich is detecting
| the original source (camera) of a picture (and the like), it
| inevitably also shows, where to "best" hide information...
|
| BeAr
| --
|
===========================================================================
| = What do you mean with: "Perfection is always an illusion"?
=
|
===============================================================--(Oops!)===