Anonymous ID: f04ce8 STEGANOGRAPHICS Jan. 20, 2019, 1:30 p.m. No.3264   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>3265 >>3268 >>3290

Using Steganography to reveal code embedded in Q pics & vids

 

Steganography is the art of hiding messages within other messages or data. Most commonly we see this utilized with pictures. This is probably encryption at its finest.

Mostly because it doesn't look like usual garbled text that we are used to seeing with encryption. The changes made by Steganography are so slight the human eye cannot perceive them.

 

also data can be hidden in audio files and video files

Anonymous ID: f04ce8 Jan. 20, 2019, 3:04 p.m. No.3274   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun

>>3272

>Apparently the method they used was putting Qs pics into a zip folder then selecting edit on the file

 

not what I would consider as a viable method of detecting an embedded message

I know a tiny bit about steganography

I've always liked crypto

I'll look to see what tools I have accumulated that are still usuable

one from long ago (XP days) is called

binaryTextScan and does what it says

scans a file for text strings (you get to set parameters such as minimum length and character set limits etcโ€ฆ)

I remember looking into pixelKnot a bit, but as it's an android only program as of now I didn't do much with it

I've seen some others

openPuff

stegDetect

VSL

 

I'd suggest we gather a set of links to tools for the purpose of detecting and decoding messages hidden in files

https://www.geekdashboard.com/best-steganography-tools/

http://www.jjtc.com/Steganography/tools.html

http://stegano.net/tools

Anonymous ID: f04ce8 Jan. 20, 2019, 4:46 p.m. No.3281   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>3285

>>3277

>Anyone know 8ch well enough to understand that phenomenon?

 

yes it has to do with the method of calculating the size

1kb = 1000 bytes or 1024 etcโ€ฆ

 

>Anon needs help

 

try reading the wiki page

https://en.wikipedia.org/wiki/Steganography_tools

https://en.wikipedia.org/wiki/Steganography

 

I'll try to answer any questions that I can

Anonymous ID: f04ce8 Jan. 20, 2019, 5:53 p.m. No.3293   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>3295

>>3287

>does qmap.pub pull raw files from Q posts?

 

good question, and a crucial one to our task here

>>3289

>Reposting the first round - the flag.

 

do you have the original file for 'FreedomFlag' ?

the original file is crucial to finding anything as far as I know

Anonymous ID: f04ce8 Jan. 20, 2019, 6:11 p.m. No.3300   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>3301

>>3291

thanQ that will be very helpful

 

>>3295

>archive.4plebs.org/pol/thread/149158110

 

it's possible, I don't immediately recognize that thread (from Sun 12 Nov 2017) do you have a particular post in mind from that thread? I don't really have the time to search thru it

Anonymous ID: f04ce8 Jan. 20, 2019, 6:28 p.m. No.3302   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun

>>3301

ahโ€ฆ OK I understand

by that the original filesize is 3Kb far too small to hold much but who knows?

 

I'm finding that the different steg software is quite specific about file types

when looking to decode

.png

.jpeg

seem to be most common as outputs for the encoding programs

anybody know what pixelKnot's outputs are ?

Anonymous ID: f04ce8 Jan. 20, 2019, 10:06 p.m. No.3309   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>3320

>>3308

>They took down the Notable from qresearch,

 

not much of a surprise

 

>hopefully we got enough man power in the meantime. I tried reaching out to another stenographer I ran with during 41818. Encourage others to reunite their teams as well if they had any.

 

sounds good anon

experienced help would be greatly appreciated

some of the anons here mean well, but are a bit short of actually understanding the mechanics of what we are doing

 

I'll keep this thread alive for a few months minimum and see if we get any results

 

I'll also fire up a few of the steg programs to see what works and what doesn't (some of 'em are OLD!) and provide some examples to help bring people up to speed

Anonymous ID: f04ce8 Jan. 20, 2019, 10:24 p.m. No.3311   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>3312

>>3310

> but I don't think it applies here.

 

I tend to disagree

If you wish to detect these embedded files you first find a method of encoding and see if that method was used.

 

If you want to cast off blindly then I'd strongly suggest you investigate the parameters of zip files

header

file descriptor

end of record marker

 

when you find all three then and only then can be sure there is a zip file embedded in the data between the header and the EOCD (Not to be confused with EOF)

https://en.wikipedia.org/wiki/Zip_(file_format)

Anonymous ID: f04ce8 Jan. 21, 2019, 6:06 a.m. No.3321   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun

Tackling Android Stego Apps in the Wild

https://arxiv.org/pdf/1808.00430.pdf

 

according to this

>As shown in the โ€œOutput Formatโ€ column, 2 of the 7

>apps produce stego images in JPEG format while the other

>5 produce PNGs. The two types of output format indicate

>different embedding domains: frequency domain embedding

>for JPEG and spatial domain embedding for PNG.

 

soโ€ฆ if it's done on an android platform the output format is either JPEG or PNG

Anonymous ID: f04ce8 Jan. 21, 2019, 6:26 a.m. No.3322   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>3323

>>3320

> I don't think a couple of hours are enough to grab moar brain power.

 

I agree

I will attempt to educate those who browse here in an attempt to grow 'moar brain power'

 

some step-by-step instruction & examples of how to use some of these software packages to hide data in images may help people learn the techniques necessary for detecting and decoding any 'found in the wild'

Anonymous ID: f04ce8 Jan. 21, 2019, 9:16 a.m. No.3327   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>3328

>>3325

Warning this is NOT a PDF

This is a test to see if we can share programs here.

this program BinaryTextScan.exe is an old windows XP utility for scanning files of any type for text strings.

I've changed the extension on the file

BinaryTextScan.exe (a useful tool for the windows platform) to

BinaryTextScan.pdf

in order to see if I can upload it here.

If successful you should be able to download this file and change the extension back to .exe and have the working program

http://www.antionline.com/showthread.php?245747-Binary-Text-Scan

Anonymous ID: f04ce8 Jan. 21, 2019, 12:42 p.m. No.3328   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>3330 >>3331 >>3365 >>3390 >>4116

>>3327

I'm uploading two files

 

qrflagEditedWreadible.png - original PNG graphic

crFzip.png - final output file with zip embedded

 

crFzip.png also has the plain text Hello World in it

I set the color of the text to be slightly off from one of the major colors in the graphic and then placed the text in that area

 

I first ran into that type of stego way back in the web design days

You'd have a front page for your website that the web crawlers would readโ€ฆ there was the black text on the background that all humans could read and also there was text in a color so near the background color the human eye couldn't see it. This was to stuff the page with key-words for the search engine crawlersโ€ฆ the crawler would see ALL the text while the humans wouldn't see all the key-words and phrases the web site designer wanted the search engine to see.

Anonymous ID: f04ce8 Jan. 21, 2019, 1:27 p.m. No.3331   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>4116

>>3328

uploading both the hex editor's view of the beginning and end of crFzip.png and HelloWorld.zip for comparison

 

and the 'color swap' technique to reveal the Hello World plain text message color embedded in a red stripe

most of the red stipe is color AB1E31 (171,30,49) so I wrote the text with font color AF1E31 (175,30,49) and it's invisible until I do a color swap

 

>>3330

yup that's the trick

Anonymous ID: f04ce8 Jan. 22, 2019, 10:06 a.m. No.3337   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>3338 >>3341 >>3373

>>3336

>Make and decode our own. Test for techniques.

 

I agree

 

I remember reading somewhere a myth about the origins of stegonography

Seems in Roman times it was common to use a small piece of wood (tabula) covered with wax as a notepad. You could scratch your message or notes onto the surface, then commit it to something more permanent at leisure if needed or simply melt the wax to erase and make the tablet ready for another use. These things were fairly common and the practice well known so of course the military used it for orders and correspondence. Here's where the fun starts, at some point a smart man figured out a method to get a secret message thru to it's intended recipient undetected. Simply scrape off all the wax, sand the surface a bit, write your real message in charcoal onto the bare wooden surface, then re-cover the tablet with wax scratch a cover message into the surface and have the tablet delivered.

Anyone not knowing there was a hidden message or how to extract it would assume the message seen on the surface was the totality of the tablets meaning.

 

I've wondered about Q's possible use of steganography. There are simple methods and complex methods of encoding, some are easy to detect and some not so easyโ€ฆ IF Q did encode messages in the graphics, will they be useful? or decoys? or some combination of both?

Anonymous ID: f04ce8 Jan. 22, 2019, 4:47 p.m. No.3341   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>3363

>>3337

good forensic tools for detecting the presence of messages hidden in files is a little hard to find, so far I've tried a few different stego progs and some work, some don't and some I cannot use due to platform restrictions.

 

the following is a quote from the softpedia site

++++++++++++++++

 

In order to be able to encrypt images, users will require specialized software applications for embedding messages and extracting them.

 

The main advantage of this security technique is that encrypted images typically require the original application to display the message, therefore unauthorized users have little chance of decrypting pictures without the appropriate tool.

Anonymous ID: f04ce8 Jan. 26, 2019, 7:22 a.m. No.3363   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>3364

>>3362

what app will you be using to do the encoding?

see

>>3341

> typically require the original application to display the message,

 

I've found this to be true in my limited experience.

I'll reciprocate,

 

I used Open Puff v4.01

password A ~ Quiet Skies

password B ~ Flesh-Eating

password C ~ Alabama Election

 

under the PNG options I used the 1/4 [25%] - High encryption setting

 

original image ~ schiffMagaHatOriginal.png

image with encoded message ~ schiffMagaHat.png

 

you tell me what the message is

Anonymous ID: f04ce8 Jan. 26, 2019, 7:57 a.m. No.3365   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>3374

>>3364

>the hunch that decode is photoshop or decompression (zip) and not app specific

 

OKโ€ฆ

care to elaborate on the method of embedding the message you'll be using?

a simple bit shift on the color for the text as discussed >>3328

 

or are you thinking it will be an embedded photoshop layer ?

Anonymous ID: f04ce8 Jan. 26, 2019, 7:52 p.m. No.3373   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun

>>3369

>or do you think that was misdirection from Q ?

I don't know

>>3337

> IF Q did encode messages in the graphics, will they be useful? or decoys? or some combination of both?

 

I didn't have much luck with pixelKnot

I'm platform limited, the only android machine I have is ancient (lollipop 5.1.1)

I could try installing android in a VM and then trying it again.

currently exploring ghiro

Anonymous ID: f04ce8 Jan. 26, 2019, 9:23 p.m. No.3375   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>3376

>>3374

I've watched part of it

it seems to be the intimate dissection of a png file, exploring the multiple hiding places within it

 

It seems there are many, many ways of hiding data in a graphics file. If you do not know the method used, it is almost impossible to determine if any message is hidden or not.

Soโ€ฆ is the current thinking to try all known methods, one at a time on each graphic file under question?

Anonymous ID: f04ce8 Jan. 27, 2019, 9:14 a.m. No.3377   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun

>>3376

>much larger than is necessary to convey a photo to this board.

 

on this we very much agree

 

>The original images that Q drops with black headers and footers have zip files embedded.

 

from my understanding the files do not have to be zipped, it can be plain text / cypher text. in the video you reference >>3324 the 'flags' are in various forms & places

Anonymous ID: f04ce8 Jan. 27, 2019, 1:12 p.m. No.3378   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>3379 >>3388

>>3277

>>3376

 

I've loaded some of the graphics from

https://postimg.cc/gallery/29wdmgyze/

 

with the black top & bottom border

>pic related it's the list

 

I've run them thru ghiro (an automated detection app)

I'll post anything I find

 

if there are graphics you'd like to add to this list, please let me know

Anonymous ID: f04ce8 Jan. 28, 2019, 4:05 p.m. No.3388   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>3389

>>3385

I just tried downloading it & renaming it edit7.zip

worked fine

 

>>3386

(a method?) there is a color shift method discussed above

adding a zip file to a png is only one of several methods, it's a simple one like the color shift can be done without steganography software

I've loaded several of the files into ghiro

>>3378

I'll dig into the results (some of the files show interesting oddities) and share which files might be worth looking at

Anonymous ID: f04ce8 Jan. 29, 2019, 6:06 a.m. No.3390   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun

>>3389

 

my point was that there are many methods besides the hidden zip file at the end of a PNG

in the video >>3324 seven (7) different areas where data can be hidden inside a PNG file without using a zip file

 

the color shift technique as demonstrated

>>3366

>>3328 (another demonstration and short explanation)

Anonymous ID: f04ce8 Jan. 31, 2019, 5:55 p.m. No.3392   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun

>>3391

you aren't alone

I'm still chugging away with the ghiro results. some of the graphics do have anomalies I'll upload a list in a day or so

IRL calls, and I must answer

 

this thread will be here

Anonymous ID: f04ce8 Feb. 1, 2019, 5:52 p.m. No.3395   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>3400

>>3394

there are many earlier versions

and yes, you are correct the size of the JPG file makes it very hard to hide anything.

the string that was found (hex address 00068) may or may not be meaningful

I've been going thru the palette to see if the color method has been used to hide text, so far no luck

Anonymous ID: f04ce8 Feb. 2, 2019, 3:37 p.m. No.3400   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun

>>3398

the originally posted image

>>>/qresearch/4989823 is the one you want to look at

the

>noisy around the planes

is due to compression from the original (oldest on the interwebz) image according to Tin Eye was from r/MilitaryPorn/ at reddit and is significantly larger at 811KB seen

>>3395

 

IF Q hid anything in the image it's in the smaller one Q posted and not the earlier ones

Rusty ID: f04ce8 March 16, 2019, 7:54 a.m. No.4116   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun

>>4115

 

when they can't explain it, they don't really have anything.

 

the one interesting thing I'll share from the most recent Q graphic

this pic >>4048

has 260 unique colors

 

they might all be used for shadingโ€ฆ or maybe one of them is used to hide text as in the example

>>3328

>>3331

 

IF a code anon could make a script that would

 

  1. count and identify the unique colors in a graphic then

  2. swap each unique color with a high contrast color one at a time

  3. run an OCR (optical character recognition) program on the modified graphic and make note if characters are identified

  4. if characters are identified note which unique color

  5. swap color back and try the next unique color on the list.

 

A human could then take this short list of unique colors that are used in characters and read the message(s)