Codefag here, i know a easyish way to find the hidden data if there is another unshopped version of this same picture? We are looking for a needle in a haystack without out it, the best approach is to first narrow down the haystack before doing brute force
Sorry I went for a walk with fam. anyways my issue is this, say I have a 8 bit binary, 10101010 this is the original binary, now I'm going to hide my data (a single bit) 10101011 you can clearly see the difference right? Now what if I delete the original binary, what do you have to compare it to? The other issue with the f5 algorithm is what if I randomly hid my data through out the image, and used the password to generate this randomness, how do we know they used f5 ? That's why it's easiest to find a source image to compare.
Q team knows all this, I think his message was really to tell us and they know what they're doing, you know? I love math, and cryptography and love the thought of sitting for hours trying to solve this but I have to follow logic which leads Me too the realisation that if they had even basic competence to them they could hide this data beyond my abilities to discover it fairly easy. Lol
Actually that got my attention lol good find let me get on pc
ok, can you imagefags crop the exact portion of the image used in both pictures from the new picture you found? down to the pixel accuracy if possible? >>2304816
what exactly did you do? with what program / password against the image ill download it and try to duplicate your results
it was a example in practice you would take the ARGB of a pixel which would be (a=0-255,R0-255,G=0-255,b=0-255) and change the LSB and then rewrite the image. I was trying to illustrate how hard it is to detect a LSB change when you view the image in a editor/image viewer without the original to compare it to.
See where anon pasted the hidden data sarah picture of the original they found? see the noise, static in the pasted portion? thats from file compression removing the pixels with compression, or that is evidence of the pixel colors being changed when data is hidden in them, if that makes any sense? i was trying to say that if you compare the original to the tampered photo you will beable to see a difference (either visually, or not with you eyes but by comparing the binary 0's and 1's directly)
yes, exactly.
for a further example, remembering that a image is made up of individual pixels and each pixel is made up of a ARGB value you can see visual what i mean about editing the LSB by going here and generating a Hex value for a color
https://www.colorhexa.com/
mine is this #221d1d (this is a black color)
then ill change it to binary for us to see
//
https://www.binaryhexconverter.com/hex-to-binary-converter
//
now here is my color
0010 0010 0001 1101 0001 1101
if i change that to this
0010 0010 0001 1101 0001 1100
go and compare that color to the original?
they arent visually different to the naked eye
each evil pos has a public key they encrypted the data with. thats how i would do it lol
https://en.wikipedia.org/wiki/Public-key_cryptography
gore pics and muh black superiority pics
is that the namefag with the long random stringer for a name?
Q mentioned the android app, so i think that's the program we should be focusing on using with the portion anon posted above
https://desudesutalk.github.io/f5stegojs/
data extracts using July212019 as pass. Image is Q image of silverman.
nice work anon. data is encrypted i bet
say i have your public key, you can attach it with your email. i can encrypt the password to my data i'm going to send you with your public key (using a public encryption method). so then you receive the data i sent you and i encrypted the password for that data with your public key, you can decrypt that password but no one else can because only you have your private key to combine with your public key.
yeah, if you thought you were super sneaky and smart, which Q makes fun of them for thinking they're l33t lol
"if you", * meant "if they". Anyways, Q team seems to truly have everything. its basically military vs civilian assets, how can you compete? they are light years ahead of us as far as technology. who knows what q's team has and is capable of?
do you have the original or a link?
July212019
thats the one i used with the password above at
https://desudesutalk.github.io/f5stegojs/ as a test used the q image too, gota data out of that with the password above
That's the salt, not the password, it's used as part of the encryption process to add noise to the algorithm, good find though. Remember there is no such thing as a random number with a computer, that's why true crypto machine will get the noise or salt from say external sensors like current radio wave readings that are random. I'm CS we use pseudo random generators to try to make random noise with the password generators. Basically the salt plus the pass is helpful, but if it's hard coded like you said then the salt is applied with the password automatically. Make sense? I have no people skills lol fuck it.
Similar crappy bugs to the first encryption app I put online i used the bytes of the hash of the users password and appended it to a string to feed into a password algorithm but I did this lol
Byte [] pass = new byte [stringlength];
Then I appended it to the string like this, string+pass.ToString () it literally appends "system.net.byte []" in c# lol anyways, where are we at with your unknot app? How can I help?
Looking at this with a simple console app. where did you get your word list from ?
https://github.com/otuncelli/f5-steganography
i see only 2/3 of the password is used in your prog so ill do the same
from_password.substring(from_password.length()/3, (from_password.length()/3)*2);
lol the special pizza door knock like a underground beerfest lmao.
how can i anonymously post code so others can use my C# version? im writing it to drag and drop images and a word list to run against all images.
Console app, nothing fancy, linux friendly
so the password is from index 0 to 2/3 so the first 2/3 from zero youre saying right?
C#fag from yesterday here, i left my code running over night testing 2/3 Of various passes, no luck. Did you find something ? I used q images that he posted though, not silverman pic since I figured you were working on it.