From: Mok-Kong Shen on
jmorton123 wrote:

> No. You cannot choose to embed into only a specific color byte
> although I could program it to do so. Remember that if you did this a
> cracker would be able to eliminate two thirds of the bytes in the
> bitmap image and just concentrate their efforts on the remaining one
> third.

What I (and I think quite many users) would like is this kind of
generality: One can specify exactly in which pixels (and which colour
of a particular pixel, i.e. different colour for different pixels) of
the LSB of a given image file is to be set to the stego bit one wants
to put in. Could you say with a few words whether this is the case
with your software? If not, I suppose it shouldn't be too difficult
for you to achieve that, since you have alredy done quite a lot
of the work.

Thanks.

M. K. Shen
From: Dave -Turner on
Yes - the lack of mathematical proof that demonstrates that it IS
bulletproof ... :)


From: mike clark on
On Jun 1, 11:54 pm, jmorton123 <jmorton...(a)rock.com> wrote:
> On May 30, 10:52 pm, Mok-Kong Shen <mok-kong.s...(a)t-online.de> wrote:
>

> I also suggested a protocol in my original post that was not quite
> right.  Here is what I wanted to say:  place your source files into a
> folder.  Zip this folder.  Use the XOR Utility Program availabe at
> KingKonglomerate.com to XOR this folder using random binary numbers
> generated with BulletProof Random Binary Number Generator, also
> available at KingKonglomerate.com.  These random binary number files
> will have file names such as FA000001.  Next, place the FA000001 file
> into another folder and zip it.  The reason for this is that you need
> to preserve the file name in order to know what file was used to XOR
> it.  Now you use the Stega_BP_v3.exe software to randomly embed this
> into a bitmap image.  

Embed what? The zipped random file or the zipped source files? I'm
guessing both.

> When you extract the file from the bitmap image,
> you already know it is a zip file.  Just add the .zip extension and
> unzip it.  In the unzipped folder you will find FA000001.  You then
> use FA000001 to XOR to get the folder with your original source files
> in it.
>

So basically you are encrypting our plaintext with a random file. Then
storing that random file and the ciphertext in (basically) the clear.
If the attacker knows your algorithm he can also extract the zipped
key file, add the .zip extension, unzip it and use the resulting
random file to decrypt the ciphertext.

From: jmorton123 on
Currently, the stega utility program embeds into the LSB of a ranomly
chosen byte in the bitmap image. This random byte is chosen based
solely on the random digit string in the Digits.txt file.

The following could easily be implemented: select a particular byte
in the bitmap image and do anything you want with any particular bit
in that byte.

Each pixel consists of three bytes: red, green, blue. All the bytes
in a bitmap image are in this order: blue, green, red.

So it would be straight forward to do what you describe.

The BulletProof source code is available on a non-exclusive basis but
requires, along with a non-disclosure agreement, a rather large sum of
money.

This is also the case for the Stega program.

JM

On Jun 2, 1:41 am, Mok-Kong Shen <mok-kong.s...(a)t-online.de> wrote:
> jmorton123 wrote:
> > No.  You cannot choose to embed into only a specific color byte
> > although I could program it to do so.  Remember that if you did this a
> > cracker would be able to eliminate two thirds of the bytes in the
> > bitmap image and just concentrate their efforts on the remaining one
> > third.
>
> What I (and I think quite many users) would like is this kind of
> generality: One can specify exactly in which pixels (and which colour
> of a particular pixel, i.e. different colour for different pixels) of
> the LSB of a given image file is to be set to the stego bit one wants
> to put in. Could you say with a few words whether this is the case
> with your software? If not, I suppose it shouldn't be too difficult
> for you to achieve that, since you have alredy done quite a lot
> of the work.
>
> Thanks.
>
> M. K. Shen

From: jmorton123 on
On Jun 2, 2:01 am, "Dave -Turner" <ad...(a)127.0.0.1> wrote:
> Yes - the lack of mathematical proof that demonstrates that it IS
> bulletproof ... :)

Ah, hah! The old if it can't be proven mathematically it can't be so,
routine.

In the Help files, along with a description of the BulletProof
software, there is an argument I make to this exact point. It is
thoroughly addresssed in, The Grand Theory.

Tell us, what in that explanation do you disagree with?

JM