Anonymous ID: 1562df July 27, 2018, 5:53 a.m. No.2309210   🗄️.is 🔗kun   >>9226 >>9228 >>9258 >>9285 >>9359

Any fellow codefags in the house?

 

Steganalysis

 

Since Q has mentioned specifically the PixelKnot steganography tool supported by Google, rather than simply blindly trying stringers and has codes as passwords I have the following suggestion to some Anon who is programmatically-inclined and provide a starting point.

 

Benfords Law is one avenue of attack against the Faugere F5 algorithm used by PixelKnot, but it appears to require a clean source image for the attack.

 

J. Fridrich proposed a technique and subsequent updated technique to probabilistically analyze images to detect the presence of steganographic markers:

 

https://www.researchgate.net/publication/220059082_Breaking_the_F5_Algorith_An_Improved_Approach

 

A flawed but partial implementation of the original Fridrich technique is located here (Python and c++):

 

https://github.com/twinz/MscStegano/blob/master/am945-dissertation.pdf

 

Im proposing taking the dissertation (flawed) implementation and updating it to use the improved algorithm in order to detect the probability of steg messages (and their estimated length) in a given image.

 

The improved algorithm has true positive and true negative rates of ~80% and ~66% respectively. 80% accuracy is a minimum threshold of accuracy for many machine-learning algorithms and is sufficient for our purposes.

 

Im proposing running all of the images Q has posted through the updated implementation in order to determine which, if any, contain steg messages, and if so, their length.

 

Alternatively, there are other open source steganalysis tools available but few if any tailored to the F5 PixelKnot algorithm specifically.

Anonymous ID: 1562df July 27, 2018, 5:59 a.m. No.2309244   🗄️.is 🔗kun   >>9253 >>9262 >>9288

>>2309226

 

It will desteg if there is actually an embedded message and you know the password.

 

Read my post - we don't actually know if steg messages are present - or if this is more disinfi.

 

Let's start by detecting whether there ARE messages present, and if so, in which target images.

 

Then, attempt matching steg'd images to stringers/hashes.

Anonymous ID: 1562df July 27, 2018, 6:05 a.m. No.2309271   🗄️.is 🔗kun

>>2309266

 

StegANALYSIS tools would be more useful than mere steganography tools. You're shooting in the dark otherwise if you don't know the algorithm, message length, or password.

Anonymous ID: 1562df July 27, 2018, 6:12 a.m. No.2309326   🗄️.is 🔗kun

>>2309288

 

Entirely dependant on compression levels.

 

720x600 48bit bitmap (or other low/ uncompressed image format) would reach megabyte levels quickly.

Anonymous ID: 1562df July 27, 2018, 6:17 a.m. No.2309352   🗄️.is 🔗kun   >>9355 >>9374 >>9412

>>2309331

 

No. Steg can just be embedded text, or can be other embedded data of any type (other images, executables, etc).

 

We don't know is my point, and Q posted many images. We should filter those down that pass steganalysis detection tests, rather than going at this blind

Anonymous ID: 1562df July 27, 2018, 6:27 a.m. No.2309400   🗄️.is 🔗kun   >>9414 >>9424

>>2309368

 

Well, if half this board can't read, you'd realize my post is finding specific target images, which we can THEN simply use PixelKnot passcodes against rather than brute forcing every pic + stringer + hashes.

 

Because that's a waste of time.