Bitcoin Forum
August 17, 2017, 10:05:37 AM *
News: Latest stable version of Bitcoin Core: 0.14.2  [Torrent].
 
   Home   Help Search Donate Login Register  
Pages: [1]
  Print  
Author Topic: TrueCrypt Steganography, hide data in quicktime files  (Read 2381 times)
Nefario
Hero Member
*****
Offline Offline

Activity: 602


GLBSE Support support@glbse.com


View Profile WWW
February 25, 2011, 01:26:38 PM
 #1

http://keyj.s2000.at/?p=458
See link, thought it would be interesting.

PGP key id at pgp.mit.edu 0xA68F4B7C

To get help and support for GLBSE please email support@glbse.com
1502964337
Hero Member
*
Offline Offline

Posts: 1502964337

View Profile Personal Message (Offline)

Ignore
1502964337
Reply with quote  #2

1502964337
Report to moderator
1502964337
Hero Member
*
Offline Offline

Posts: 1502964337

View Profile Personal Message (Offline)

Ignore
1502964337
Reply with quote  #2

1502964337
Report to moderator
1502964337
Hero Member
*
Offline Offline

Posts: 1502964337

View Profile Personal Message (Offline)

Ignore
1502964337
Reply with quote  #2

1502964337
Report to moderator
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction. Advertise here.
1502964337
Hero Member
*
Offline Offline

Posts: 1502964337

View Profile Personal Message (Offline)

Ignore
1502964337
Reply with quote  #2

1502964337
Report to moderator
Vasiliev
Jr. Member
*
Offline Offline

Activity: 55


View Profile
February 26, 2011, 01:15:25 AM
 #2

I do not believe this would work against a determined (and very smart) attacker. Although video files test as being completely random, I believe it is quite likely that there are patterns within them. See this comparison of overheads for containers. In a ~993MB MP4 file, the MP4 container is about 2.4MB. Not much, but it seems that MP4 structures would appear at predictable areas in the file. (MKV is 1.5-1.8MB, btw)

Additionally, it is easy to figure out if One Of These Things Just Doesn't Belong with a video file. Just demux the video file. (There are many, many tools to do this. FFmpeg can.) If the video/audio tracks add up to less than the actual filesize (minus approximate overhead), then there is something odd about that file. Or, obviously, if one of the tracks is of unknown type and you can't decode it.


But I am assuming a "We only have twenty four hours to disarm the bomb and the code is in this computer!!" situation. Against a less determined, or more cursory, inspection (ACTA's border searches, for example) this steganography would work great.

1DiaPwjDV6rLB2KrBA7gzitzSWCJmXnESy
Pages: [1]
  Print  
 
Jump to:  

Sponsored by , a Bitcoin-accepting VPN.
Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!