The Steganography Link Farm
Crack 5.0 for NT (v0.20) is now available
HERE!
An earlier version of the v0.20 archive was missing that all-important patch,
and so the first (MD4-less) archive is also
here (in case I messed up again.)
The current test release of the software is
here and includes
a heavily-optimised brute-force cracking engine.
(It runs at around 4 millions trials per minute on a P133/16Mb,
about 25% faster than
l0phtcrack
for one password,
and 100% faster for one hundred passwords.)
Please note :
1. the test release is simply a `make clean`d tar-ball of
my development tree, created whenever I feel the urge.
It may be broken, incomplete, or hopelessly out-of-date,
and the minimal documentation is certainly going to be
inaccurate or even downright misleading.
2. if you do the math, you may find that the amount of time
you will have to wait for a brute-force cracker to terminate
is quite scary!
Unfortunately, the development platforms are currently all non-NT,
but it does compile and run happily on Linux/Intel, SunOS 4.1.3, and
whatever *nix the alpha down the hall is running -- if any *nix-isms
have managed to creep in, they should be easy to eliminate from the code.
If there are any problems, please
mail me.
Future features will include :
- the ability to continue work from the same place after a crash / re-boot
- a network brute-forcing facility
- pre-compiled binaries for various platforms
- accurate documentation ;-)
- more self-test routines
You have stumbled upon a web-page very much under construction!
In particular, there may be broken links, and incorrect mailto: tags.
[
What's New? |
Publications & Conferences |
Research Groups |
Other Resources
]
What's New?
-
Steganography and JPEG Compression.
(2.3 Mb.)
-
J4.
Code from the above.
Currently unavailable.
-
Weaknesses in Current Software.
-
Ideas for New Software.
-
Search Engines :
Publications & Conferences
-
Information Hiding - An Annotated Bibliography.
Anderson.
(Postscript.
)
-
Workshop on Information Hiding
(Cambridge, UK, 1996.) :
-
Stretching the Limits of Steganography.
Anderson.
-
Modulation and Information Hiding in Images.
Smith & Comiskey.
-
Oblivious Key Escrow.
Blaze. ???
-
Surmounting the Effects of Lossy Compression on Steganography.
Currie & Irvine.
Proc. of the 19th National Information System Security Conference,
(Baltimore, Md), Oct 1996, pp. 194-201.
-
Disappearing Cryptography
Wayner. Academic Press, 1996. :
-
Cover Blurb
-
Comment
by the author in the cypherpunks archive.
-
Review
by Peter Neumann in RISKS.
-
Byte
International had a series of articles in the January 1997 issue :
-
Look, It's Not There.
-
Steganography Overcomes Cryptography Restrictions.
-
How to Embed a Watermark.
-
Enforcing Watermarks.
-
Doctor Dobb's Journal
also had an article in the January 1997 issue :
-
Steganography for DOS Programmers.
-
Phrack
had an article in issue 49 :
-
A Steganography Improvement Proposal.
Shame it's nonsense, though.
- Unsorted, I'm afraid :
-
-
A WWW service to embed and prove digital copyright
watermarks.
Zhao.
Proc. of the European Conference on Multimedia Applications, Services and
Techniques (Louvain-La-Neuve, Belgium), pp. 695-710, 1996.
-
Digital Copyright Labeling: Providing Evidence Of Misuse and
Tracking Unauthorized Distribution Of Copyrighted Materials.
Zhao & Koch.
OASIS Magazine, Dec 1995.
-
Embedding Robust Labels Into Images For Copyright
Protection.
Zhao & Koch.
Proc. Int. Congr. on IPR for Specialized Information, Knowledge
and New Technologies (Vienna, Austria), 1995.
-
Towards Robust and Hidden Image Copyright Labeling.
Koch & Zhao.
Proc. 1995 IEEE Workshop on Nonlinear Signal and Image
Processing (Neos Marmaras, Greece), 1995.
-
Copyright Protection for Multimedia Data
Koch, Rindfrey & Zhao.
Proc. of the International Conference on Digital Media and Electronic
Publishing (Leeds, UK), 1994.
-
Document Marking and Identification using both Line and Word
Shifting.
Low, Maxemchuk, Brassil, & O'Gorman.
IEEE Infocom '95 (Boston, MA).
-
Copyright Protection for Electronic Publishing over Computer
Networks.
Choudhury, Maxemchuk, Paul, & Schulzrinne.
IEEE Network, v. 9 no. 3, May/Jun 1995, pp. 12-20.
-
Hiding Information in Document Images
Brassil, Low, Maxemchuk, & O'Gormann.
1995.
-
Electronic Marking and Identification Techniques to Discourage
Document Copying.
Brassil, Low, Maxemchuk, & O'Gorman.
IEEE Infocom '94 (Toronto, Canada), pp. 1278-1287.
-
Electronic Document Distribution.
Maxemchuk.
AT&T Technical Journal, v. 73 no. 5, pp. 73-80,
Sep/Oct 1994.
-
Watermarking Digital Images for Copyright Protection.
O'Ruanaidh, Boland & Sinnen.
Electronic Imaging and the Visual Arts (Florence, Italy), Feb 1996.
-
Secure Spread Spectrum Watermarking for Multimedia.
Cox, Kilian, Leighton, & Shamoon.
NECI Technical Report 95-10.
-
Work Package 8 : Watermarking
ACCOPI. 1995.
-
Invisible Communication.
Aura.
(HTML)
-
Steganography.
Johnson.
-
Steganography: Its History and Its Application To Computer Based
Data Files.
Davern & Scott.
Research Groups
(... tending to deal with the slightly different
requirements of digital watermarks.)
-
ACCOPI Access Control and COpyright Protection for Images (RACE)
-
AT&T Bell Laboratories
(Brassil, Low, Maxemchuk & O'Gorman)
-
DICE Argent Digital Watermarks
-
Digimarc
-
EPFL (Ecole Polytechnique Federale de Lausanne)
-
High Water FBI Fingerprinting Binary Images
-
IBM Watermarks: Protecting the Image
-
MIT Data Hiding
-
NEC (Press Release)
-
SysCoP System for Copyright Protection (Koch & Zhao)
-
Talisman Tracing Authors' rights by Labeling Image Services
and Monitoring Access Network (ACTS)
Other Resources
(This section still needs to be tidied up a little!)
-
sci.crypt
-
steganography mailing list
-
coderpunks mailing list
(first point your NNTP newsreader at nntp.hks.net)
-
cypherpunks mailing list and
archive
-
Steganography Info and Archive (Eric Milbrandt)
-
WEPIN Store
-
The Ancient Art of Steganography (Tools For Privacy)
-
Security and Privacy Issues (Neil F. Johnson)
-
Steganography (Michael Sattler)
-
Steganography no solution Finney
Jeweled Granite effect from
Jelane's Free Web Graphics,
QBullets by
Matterform Media,
other inline images by
Ender Design.
ATTEMPT TO VALIDATE