[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[FYI] (Fwd) Stegdetect 0.4 released and results from USENET search available
- To: debate@lists.fitug.de
- Subject: [FYI] (Fwd) Stegdetect 0.4 released and results from USENET search available
- From: "Axel H Horns" <horns@ipjur.com>
- Date: Fri, 21 Dec 2001 19:30:29 +0100
- CC: krypto@thur.de
- Delivered-To: mailing list debate@lists.fitug.de
- List-Help: <mailto:debate-help@lists.fitug.de>
- List-Id: <debate.lists.fitug.de>
- List-Post: <mailto:debate@lists.fitug.de>
- List-Subscribe: <mailto:debate-subscribe@lists.fitug.de>
- List-Unsubscribe: <mailto:debate-unsubscribe@lists.fitug.de>
- Mailing-List: contact debate-help@lists.fitug.de; run by ezmlm
- Organization: NONE
- Priority: normal
------- Forwarded message follows -------
From: Niels Provos <provos@citi.umich.edu>
To: cryptography@wasabisystems.com
Subject: Stegdetect 0.4 released and results from USENET search available
Date sent: Fri, 21 Dec 2001 12:16:14 -0500
I just released Stegdetect 0.4. It contains the following changes:
- Improved detection accuracy for JSteg and JPhide.
- JPEG Header Analysis reduces false positives.
- JPEG Header Analysis provides rudimentary detection of F5.
- Stegbreak uses the file magic utility to improve dictionary
attack against OutGuess 0.13b.
You can download the UNIX source code or windows binary from
http://www.outguess.org/download.php
-----
The results from analyzing one million images from the Internet
Archive's USENET archive are available at
http://www.citi.umich.edu/u/provos/stego/usenet.php
[...]
After scanning two million images from eBay without finding any
hidden messages, we extended the scope of our analysis.
This page provides details about the analysis of one million images
from the Internet Archive's USENET archive.
Processing the one million images with stegdetect results in about
20,000 suspicious images. We launched a dictionary attack on the
JSteg and JPHide positive images. The dictionary has a size of
1,800,000 words and phrases. The disconcert cluster used to
distribute the dictionary attack has a peak performance of roughly
87 GFLOPS.
However, we have not found a single hidden message.
[...]
Comments and feedback are welcome. We have an FAQ at
http://www.citi.umich.edu/u/provos/stego/faq.html
Regards and a merry Christmas,
Niels Provos
---------------------------------------------------------------------
The Cryptography Mailing List Unsubscribe by sending "unsubscribe
cryptography" to majordomo@wasabisystems.com
------- End of forwarded message -------
--
To unsubscribe, e-mail: debate-unsubscribe@lists.fitug.de
For additional commands, e-mail: debate-help@lists.fitug.de