Hide Data in Images & Audio with Cloacked-Pixel
Learn how to conceal information within images and audio using cloacked-pixel, a tool for steganography. π

Learning computer stuff
104 views β’ Dec 17, 2017

About this video
It's possible to hide any information in images and images
behind audio tracks. Using cloacked-pixel - https://github.com/livz/cloacked-pixel,
one can analyse image files and compare them to originals. A
stenographed image file is larger than the original and has additional
information in it. If you want to hide a text inside an image then you
can do it with lsb.py. This is a program that encrypts the
text and puts its pieces into places of an image file containing least
significant bits. The probability that the new value for
those bits remains the same is 50 %. As these bits have the least
influence on the outlook of the image, for naked eye, no change seems
to appear. If an image file is abnormally large in size, one can
suspect that some hidden information is in it. Using the same password
as was used for hiding information, that data can be extracted into a
new file. elliot extracts a program code from a specific image file,
stores it into a new file and executes it. That code is meant to
generate a key using the same image file. One more layer of
information hiding is the rename of the file. With xxd,
elliot accesses the raw data of the image file and it turns out, that
the file is in another format than the file extension could mean. ryan kazanciyan knows more: https://medium.com/@ryankazanciyan/mr-robot-disassembled-eps3-9-shutdown-r-e03d5fa0069a.
Mr. Robot 3 / 10: 5152-254
behind audio tracks. Using cloacked-pixel - https://github.com/livz/cloacked-pixel,
one can analyse image files and compare them to originals. A
stenographed image file is larger than the original and has additional
information in it. If you want to hide a text inside an image then you
can do it with lsb.py. This is a program that encrypts the
text and puts its pieces into places of an image file containing least
significant bits. The probability that the new value for
those bits remains the same is 50 %. As these bits have the least
influence on the outlook of the image, for naked eye, no change seems
to appear. If an image file is abnormally large in size, one can
suspect that some hidden information is in it. Using the same password
as was used for hiding information, that data can be extracted into a
new file. elliot extracts a program code from a specific image file,
stores it into a new file and executes it. That code is meant to
generate a key using the same image file. One more layer of
information hiding is the rename of the file. With xxd,
elliot accesses the raw data of the image file and it turns out, that
the file is in another format than the file extension could mean. ryan kazanciyan knows more: https://medium.com/@ryankazanciyan/mr-robot-disassembled-eps3-9-shutdown-r-e03d5fa0069a.
Mr. Robot 3 / 10: 5152-254
Video Information
Views
104
Likes
2
Duration
1:03
Published
Dec 17, 2017
Related Trending Topics
LIVE TRENDSRelated trending topics. Click any trend to explore more videos.
Trending Now