B
B. R. 'BeAr' Ederson
| I describe 2 things: There are possibilities for general (heuristic)
| detection of abnormal formed data file sections.
What's the second?
| And your described method has to be refined to really be useful.
That's the second. (And maybe the method isn't worth the effort of
refining, at all...)
Why don't you experiment with your idea of steganographic content surviving
more than one compression? And report the results here? That would be a
real contribution.
You don't get! I posted the results: The first picture I choose to
manipulate the way you suggested had barely half the data altered, if
you don't do a byte-by-byte comparison but allow realignment. The
streams of unaltered data comprise of several dozen to several hundred
bytes in a row. Enough to store code within. You can try by yourself.
But it isn't worth to further pursue this in such a trivial approach.
And I posted before, that outcome is supposed by design of the JPEG
compression algorithm. I could sit down and think of a method to alter
chrominance, too, using a method which doesn't render the picture
ugly/useless.
If you read (and understood) my first posting, you'd know by now, that
I regard the true and sustainable "disinfection" a non-trivial task.
Otherwise, similar topics wouldn't be military funded university
research themes. Whether this degree of knowledge is required for
dealing with that topic depends (of course) on the sophistication
used by manufacturing the malicious sample.
BeAr