The Steganography Link Farm

----------------------------------------

Crack 5.0 for NT (v0.20) is now available HERE!

An earlier version of the v0.20 archive was missing that all-important patch, and so the first (MD4-less) archive is also here (in case I messed up again.)

The current test release of the software is here and includes a heavily-optimised brute-force cracking engine. (It runs at around 4 millions trials per minute on a P133/16Mb, about 25% faster than l0phtcrack for one password, and 100% faster for one hundred passwords.)

Please note :

1. the test release is simply a `make clean`d tar-ball of my development tree, created whenever I feel the urge. It may be broken, incomplete, or hopelessly out-of-date, and the minimal documentation is certainly going to be inaccurate or even downright misleading.

2. if you do the math, you may find that the amount of time you will have to wait for a brute-force cracker to terminate is quite scary!

Unfortunately, the development platforms are currently all non-NT, but it does compile and run happily on Linux/Intel, SunOS 4.1.3, and whatever *nix the alpha down the hall is running -- if any *nix-isms have managed to creep in, they should be easy to eliminate from the code.

If there are any problems, please mail me.

Future features will include :

----------------------------------------

You have stumbled upon a web-page very much under construction!
In particular, there may be broken links, and incorrect mailto: tags.

----------------------------------------

[ What's New? | Publications & Conferences | Research Groups | Other Resources ]

----------------------------------------

What's New?

o
Steganography and JPEG Compression. (PS) (2.3 Mb.)
o
J4. (Files) Code from the above. Currently unavailable.
o
Weaknesses in Current Software.
o
Ideas for New Software.
o
Search Engines :
Alta Vista (Search) Steganography (Links) Digital Watermark (Links)
Lycos (Search) Steganography (Links) Digital Watermark (Links)
Yahoo (Search) Steganography (Links) Digital Watermark (Links)
Deja News (Search)


----------------------------------------

Publications & Conferences

Information Hiding - An Annotated Bibliography. (HTML) Anderson. (Postscript. (PS))

Workshop on Information Hiding (HTML) (Cambridge, UK, 1996.) :
(New!)
Stretching the Limits of Steganography. (PS) Anderson.
(New!)
Modulation and Information Hiding in Images. (PS) Smith & Comiskey.
(New!)
Oblivious Key Escrow. (PS) Blaze. ???

Surmounting the Effects of Lossy Compression on Steganography. (HTML) Currie & Irvine. Proc. of the 19th National Information System Security Conference, (Baltimore, Md), Oct 1996, pp. 194-201.

Disappearing Cryptography (HTML) Wayner. Academic Press, 1996. :
(New!)
Cover Blurb (HTML)
(New!)
Comment (HTML) by the author in the cypherpunks archive.
(New!)
Review (HTML) by Peter Neumann in RISKS.

Byte (Home Page) International had a series of articles in the January 1997 issue :
(New!)
Look, It's Not There. (HTML)
(New!)
Steganography Overcomes Cryptography Restrictions. (HTML)
(New!)
How to Embed a Watermark. (HTML)
(New!)
Enforcing Watermarks. (HTML)

Doctor Dobb's Journal (Home Page) also had an article in the January 1997 issue :
(New!)
Steganography for DOS Programmers. (HTML)

Phrack (Home Page) had an article in issue 49 :
(New!)
A Steganography Improvement Proposal. (ASC)
Shame it's nonsense, though.

Unsorted, I'm afraid :

A WWW service to embed and prove digital copyright watermarks. Zhao. Proc. of the European Conference on Multimedia Applications, Services and Techniques (Louvain-La-Neuve, Belgium), pp. 695-710, 1996.
Digital Copyright Labeling: Providing Evidence Of Misuse and Tracking Unauthorized Distribution Of Copyrighted Materials. Zhao & Koch. OASIS Magazine, Dec 1995.
Embedding Robust Labels Into Images For Copyright Protection. Zhao & Koch. Proc. Int. Congr. on IPR for Specialized Information, Knowledge and New Technologies (Vienna, Austria), 1995.
Towards Robust and Hidden Image Copyright Labeling. Koch & Zhao. Proc. 1995 IEEE Workshop on Nonlinear Signal and Image Processing (Neos Marmaras, Greece), 1995.
Copyright Protection for Multimedia Data Koch, Rindfrey & Zhao. Proc. of the International Conference on Digital Media and Electronic Publishing (Leeds, UK), 1994.
Document Marking and Identification using both Line and Word Shifting. Low, Maxemchuk, Brassil, & O'Gorman. IEEE Infocom '95 (Boston, MA).
Copyright Protection for Electronic Publishing over Computer Networks. Choudhury, Maxemchuk, Paul, & Schulzrinne. IEEE Network, v. 9 no. 3, May/Jun 1995, pp. 12-20.
Hiding Information in Document Images Brassil, Low, Maxemchuk, & O'Gormann. 1995.
Electronic Marking and Identification Techniques to Discourage Document Copying. Brassil, Low, Maxemchuk, & O'Gorman. IEEE Infocom '94 (Toronto, Canada), pp. 1278-1287.
Electronic Document Distribution. Maxemchuk. AT&T Technical Journal, v. 73 no. 5, pp. 73-80, Sep/Oct 1994.
Watermarking Digital Images for Copyright Protection. O'Ruanaidh, Boland & Sinnen. Electronic Imaging and the Visual Arts (Florence, Italy), Feb 1996.
Secure Spread Spectrum Watermarking for Multimedia. Cox, Kilian, Leighton, & Shamoon. NECI Technical Report 95-10.
Work Package 8 : Watermarking ACCOPI. 1995.
Invisible Communication. Aura. (HTML)
Steganography. Johnson.
Steganography: Its History and Its Application To Computer Based Data Files. Davern & Scott.


----------------------------------------

Research Groups

(... tending to deal with the slightly different requirements of digital watermarks.)

ACCOPI Access Control and COpyright Protection for Images (RACE)
AT&T Bell Laboratories (Brassil, Low, Maxemchuk & O'Gorman)
DICE Argent Digital Watermarks
Digimarc
EPFL (Ecole Polytechnique Federale de Lausanne)
High Water FBI Fingerprinting Binary Images
IBM Watermarks: Protecting the Image
MIT Data Hiding
NEC (Press Release)
SysCoP System for Copyright Protection (Koch & Zhao)
Talisman Tracing Authors' rights by Labeling Image Services and Monitoring Access Network (ACTS)


----------------------------------------

Other Resources

(This section still needs to be tidied up a little!)

sci.crypt
steganography mailing list
coderpunks mailing list (first point your NNTP newsreader at nntp.hks.net)
cypherpunks mailing list and archive
Steganography Info and Archive (Eric Milbrandt)
WEPIN Store
The Ancient Art of Steganography (Tools For Privacy)
Security and Privacy Issues (Neil F. Johnson)
Steganography (Michael Sattler)
Steganography no solution Finney


----------------------------------------
R.Tinsley@rhbnc.ac.uk

Jeweled Granite effect from Jelane's Free Web Graphics, QBullets by Matterform Media, other inline images by Ender Design.

ATTEMPT TO VALIDATE