1
   

A hard steganography test

 
 
RaducE
 
Reply Fri 4 Jan, 2008 11:36 am
OK.This is a very hard image.It means much to me so please help me get it solved

http://www.hackquest.com/modules/HackQuest/hacking/89757/file.jpg
  • Topic Stats
  • Top Replies
  • Link to this Topic
Type: Discussion • Score: 1 • Views: 1,516 • Replies: 13
No top replies

 
Chai
 
  1  
Reply Fri 4 Jan, 2008 12:13 pm
It's a wombat.
0 Replies
 
Phoenix32890
 
  1  
Reply Fri 4 Jan, 2008 12:48 pm
What the hell are we supposed to do with THAT???? Mad
0 Replies
 
Chai
 
  1  
Reply Fri 4 Jan, 2008 01:34 pm
Was that Mad addressed to me or Rad?


I don't know, what does anyone do with a wobat?
0 Replies
 
Region Philbis
 
  1  
Reply Fri 4 Jan, 2008 01:41 pm
my work firewall is blocking the pic, so it must be a doozy...
0 Replies
 
Phoenix32890
 
  1  
Reply Fri 4 Jan, 2008 01:43 pm
Chai- I was directing my remark to RaducE. For the life of me, I can't figure the point of the whole thing.
0 Replies
 
TTH
 
  1  
Reply Fri 4 Jan, 2008 02:02 pm
RaducE
Does this thread have something to do with learning to become a hacker?
0 Replies
 
alex240101
 
  1  
Reply Fri 4 Jan, 2008 02:03 pm
scary
Is wobat dead or alive?
0 Replies
 
cyphercat
 
  1  
Reply Fri 4 Jan, 2008 03:38 pm
what on earth is steganography? Shouldn't that be a stegasaurus, not a wombat?
0 Replies
 
mismi
 
  1  
Reply Fri 4 Jan, 2008 03:42 pm
It looks the same...even when I squint - yeah...I'd say it's a wombat
0 Replies
 
Chai
 
  1  
Reply Fri 4 Jan, 2008 03:44 pm
would someone PLEASE tell me what I'm supposed to do with this wombat?



I'm gonna go get it a nice dish of water.
0 Replies
 
Region Philbis
 
  1  
Reply Fri 4 Jan, 2008 05:19 pm
whatever you do, don't feed it after midnight...
0 Replies
 
Phoenix32890
 
  1  
Reply Fri 4 Jan, 2008 05:45 pm
Quote:
steganography
Hiding a message within an image, audio or video file. Used as an alternate to encryption, it takes advantage of unused bits within the file structure or bits that are mostly undetectable if altered. A steganographic message rides secretly to its destination, unlike encrypted messages, which although undecipherable without the decryption key, can be identified as encrypted.


When I first saw the thread, I thought that the writer has misspelled stenography! Laughing
0 Replies
 
Phoenix32890
 
  1  
Reply Fri 4 Jan, 2008 05:47 pm
Quote:
Steganography
Steganography (from the Greek for "covered writing") is the secret transmission of a message. It is distinct from encryption, because the goal of encryption is to make a message difficult to read while the goal of steganography is to make a message altogether invisible. A steganographic message may also be an encrypted as an extra barrier to interception, but need not be. Steganography has the advantage that even a talented code-cracker cannot decipher a message without knowing it is there.

Steganography has been used since ancient times; Greek historian Herodotus records how one plotter of a revolt communicated secretly with another by shaving a slave's head, writing on his scalp, letting his hair grow back, and sending the slave as an apparently unencumbered messenger. The number of ways in which a steganographic message might be sent is limited only by human ingenuity. A photograph of a large group of people, for example, might contain a Morse-code message in the expressions of the people in the photograph (e.g., smiling for dot, blank for dash) or in the directions they are looking (e.g., slightly to the left for dot, straight at the camera for dash). Writing in invisible ink or miniaturizing a message, as on microfilm, are also forms of steganography. Probably the commonest form of steganography involves the embedding of messages in apparently innocent texts, with the letters or words of the message indicated either by subtle graphic emphasis (e.g., heavier ink, lighter ink, a small defect) or by special positioning. For instance, reading the first word of every sentence in what appears to be an ordinary letter might yield a steganographic message.

Like most other forms of cryptography and secret writing, steganography has thrived in the digital era. Most digital documents contain useless or insignificant areas of data, or involve enough redundancy that some of their information can be altered without obvious effect. For instance, one might conceal a message bitstream inside a digital audio file by replacing the least-significant bit of every waveform sample (or every nth waveform sample) with a message bit; the only effect on the file, if played back as audio, would be a slight decrease in the sound quality (probably imperceptible). Although steganographic messages can be hidden in any kind of digital files, image files, because they contain so much data to begin with, are usually used for digital steganography. Today a number of commercial or shareware programs exist for encoding text into steganographic images ("stego-images"), and are used by millions of people worldwide who wish to evade surveillance, especially by governments. This includes people who have reason to fear punishment for expressing their political ideas, as well as terrorists.

After the terrorist attacks of September 11, 2001, U.S. officials claimed that members of the group al-Qaeda, as well as of other terrorist groups, had used steganographic software to communicate plans to each other, hiding messages in images on pornographic Web sites and in sports chat rooms. Training camps for extremists in a number of countries now include instruction in cryptographic techniques, including digital steganography.

Steganography is also used for the less dramatic purpose of watermarking, which is the hiding of information indicating ownership or origin inside a digital file. (Physical watermarking, the practice after which digital watermarking is named, is the impression of a subtle pattern on paper using water. A watermark is only visible when the paper is held up to a light.) Watermarking can be used for digital authentication (i.e., to prove that certain party was indeed the source of a file) or to check whether a digital file was obtained in violation of copyright.
0 Replies
 
 

Related Topics

Lovatts - Question by margaret schwerin
1001 Ways to Call Someone "Stupid." - Discussion by DrewDad
Famous People Name Game - Discussion by Mame
Cities and Towns of USA - Discussion by Miller
Post about the one before you - Discussion by Green Army Sniper
Where am I - Travel Game II. - Discussion by Walter Hinteler
WHAT'S NEXT? - Discussion by Rod3
 
  1. Forums
  2. » A hard steganography test
Copyright © 2024 MadLab, LLC :: Terms of Service :: Privacy Policy :: Page generated in 0.03 seconds on 12/27/2024 at 06:57:27