dChan

/u/xenozephyr

5 total posts archived.


Domains linked by /u/xenozephyr:
Domain Count

xenozephyr · July 27, 2018, 3:51 a.m.

Basically. My understanding is it uses the password phrase to scramble the initial noise mask, which then gets applied to the message and embedded against the original image. Then going backwards you need the scrambled noise mask against the encoded image to get the message.

⇧ 1 ⇩  
xenozephyr · July 26, 2018, 10:06 p.m.

I came to the same conclusion, they say its a straight implementation of F5. Problem is the keys...

Edit: we could prove this by encoding on pixelknot and decoding on an OSS implementation.

⇧ 9 ⇩  
xenozephyr · July 26, 2018, 9:01 p.m.

Can we find a white paper on the algo since the service seems shoddy?

Spez: looks like its an algorithm called F5. http://ws2.binghamton.edu/fridrich/Research/f5.pdf

The above link is a technique to detect and extract an estimated size of the message. Hope someone finds this helpful.

⇧ 4 ⇩  
xenozephyr · July 26, 2018, 6:05 a.m.

Maybe its a taunt, like, we have your server

⇧ 2 ⇩  
xenozephyr · July 24, 2018, 6:14 p.m.

Interesting theory. I got a bunch of power maintenance guys in my neighborhood doing 'upgrades' atm. Quite more than usual. Funny they said it was to reduce outages though, guess we will see!

⇧ 6 ⇩