From: jmorton123 on
I think I wrote in one too-big paragraph. Here it is step by step and
why as I go along:

1.) place your source files into a folder and zip that folder.
2.) XOR this zipped folder with a random binary number file generated
using the BulletProof software. That random binary number file will
have a name such as, FA000001. Name this XORed zipped folder,
FA000001 so by just looking at the zipped folder name you will know
what random binary number file was used to XOR the folder.
3.) Place FA000001 into another folder and zip it. It is not
important what you call this last zipped folder. What is important is
that you know that it is a zipped folder.
4.) Use Stega_BP_v3.exe and embed this last zipped folder into a
bitmap image using Digits.txt. Like it says in the Stega
instructions, if you want to be sure the maximum file size of 110KB is
successfully embedded into a bitmap image, make the bitmap image file
at least 1760KB and the Digits.txt file at least 10,000,000 random
digits long. This should be guaranteed successful. And any source
file smaller will also be successfully embedded, guaranteed.
5.) So here you are with a bitmap image file with your double-zipped
and XORed source embedded into it.

If you like you can now post this bitmap image on your website. Then
go to your website and right-click on the bitmap image and save it to
your hard drive. Or email the bitmap image to yourself then open your
email and save the bitmap image to your hard drive.

Now start Stega_BP_v3.exe and select extract. Input this bitmap image
as the source bitmap image file. Again, use your Digits.txt random
digits file for you next input and save the extracted file as any name
you like but put a .zip extension on it.

This source bitmap image file you are extracting from is the exact
same one you used originally to embed with except of course the LSBs
of the randomly chosen bytes within it have been set to your source's
bits. When you run Stega to extract, it will use the Digits.txt to
generate the exact same random numbers to access the exact same random
bytes from this bitmap image. It knows to extract the LSBs from these
random bytes and to recombine them to extract the embedded file which
is your last zip file.

So now you have extracted the file you saved with the added .zip
extension. You added the .zip extension because you already know that
the file is a zipped file.

Now unzip this file and you will get your FA000001 zipped file from
within this unzipped folder.

See, if you did not zip up the FA000001 zipped file into this last zip
file, you could not have transmitted the name of the FA000001 random
binary number file used to XOR the folder containing your source
files. You would have had to find another way to let yourself know
what random binary number file to use to re-XOR the zip file to get
your original source files back.

When you XORed the folder with your source files in it, every byte got
XORed. And if you used a "useable" random binary number file
generated with BulletProof, there is no way anyone can determine what
the contents of the XORed file is by just trying to crack the random
binary numbers used.

So this is my highly recommended protocol.

You are embedding only one file: the last zipped file that has in it
the XORed zip file named, FA000001 that when re-XORed gives you the
folder that has in it your original source files.

I think this is correct.

I appreciate your interest.

Ten years ago if anyone would have told me the country and the world
would be where it is today, I'd say they were crazy. Well, here we
are. I think that if someone today came up to me and rightly told me
how things would be in another ten years from now, I'd probably say
they were crazy.

I would not let BulletProof, XOR, and Bitmap Steganography pass me
by. Who knows, this software might not be available tomorrow. Things
change.

JM

On Jun 2, 6:30 am, mike clark <m...(a)netadv.net> wrote:
> On Jun 1, 11:54 pm, jmorton123 <jmorton...(a)rock.com> wrote:
>
> > On May 30, 10:52 pm, Mok-Kong Shen <mok-kong.s...(a)t-online.de> wrote:
>
> > I also suggested a protocol in my original post that was not quite
> > right.  Here is what I wanted to say:  place your source files into a
> > folder.  Zip this folder.  Use the XOR Utility Program availabe at
> > KingKonglomerate.com to XOR this folder using random binary numbers
> > generated with BulletProof Random Binary Number Generator, also
> > available at KingKonglomerate.com.  These random binary number files
> > will have file names such as FA000001.  Next, place the FA000001 file
> > into another folder and zip it.  The reason for this is that you need
> > to preserve the file name in order to know what file was used to XOR
> > it.  Now you use the Stega_BP_v3.exe software to randomly embed this
> > into a bitmap image.  
>
> Embed what? The zipped random file or the zipped source files? I'm
> guessing both.
>
> > When you extract the file from the bitmap image,
> > you already know it is a zip file.  Just add the .zip extension and
> > unzip it.  In the unzipped folder you will find FA000001.  You then
> > use FA000001 to XOR to get the folder with your original source files
> > in it.
>
> So basically you are encrypting our plaintext with a random file. Then
> storing that random file and the ciphertext in (basically) the clear.
> If the attacker knows your algorithm he can also extract the zipped
> key file, add the .zip extension, unzip it and use the resulting
> random file to decrypt the ciphertext.

From: Mok-Kong Shen on
jmorton123 wrote:
> Currently, the stega utility program embeds into the LSB of a ranomly
> chosen byte in the bitmap image. This random byte is chosen based
> solely on the random digit string in the Digits.txt file.
>
> The following could easily be implemented: select a particular byte
> in the bitmap image and do anything you want with any particular bit
> in that byte.
>
> Each pixel consists of three bytes: red, green, blue. All the bytes
> in a bitmap image are in this order: blue, green, red.
>
> So it would be straight forward to do what you describe.
>
> The BulletProof source code is available on a non-exclusive basis but
> requires, along with a non-disclosure agreement, a rather large sum of
> money.
>
> This is also the case for the Stega program.

But the title of the thread says it's freeware, isn't it?

M. K. Shen

From: jmorton123 on
The freeware is free.

Not the source code.

JM

On Jun 3, 6:50 am, Mok-Kong Shen <mok-kong.s...(a)t-online.de> wrote:
> jmorton123 wrote:
> > Currently, the stega utility program embeds into the LSB of a ranomly
> > chosen byte in the bitmap image.  This random byte is chosen based
> > solely on the random digit string in the Digits.txt file.
>
> > The following could easily be implemented:  select a particular byte
> > in the bitmap image and do anything you want with any particular bit
> > in that byte.
>
> > Each pixel consists of three bytes:  red, green, blue.  All the bytes
> > in a bitmap image are in this order:  blue, green, red.
>
> > So it would be straight forward to do what you describe.
>
> > The BulletProof source code is available on a non-exclusive basis but
> > requires, along with a non-disclosure agreement, a rather large sum of
> > money.
>
> > This is also the case for the Stega program.
>
> But the title of the thread says it's freeware, isn't it?
>
> M. K. Shen- Hide quoted text -
>
> - Show quoted text -

From: Mok-Kong Shen on
jmorton123 wrote:
> The freeware is free.
>
> Not the source code.

I maintain: If you could do a bit generalization as I mentioned, your
software would get a wider acceptance.

M. K. Shen
From: jmorton123 on
So you want to be able to input which bytes to access and which bits
within each byte to manipulate, right?

Give me an example of the precise input you want to be able to make to
get the desired output and describe the output precisely. Don't just
describe it: give me the input you would expect to make - the
complete input, not generalities, and how do you want to enter the
input?

JM

On Jun 4, 1:30 am, Mok-Kong Shen <mok-kong.s...(a)t-online.de> wrote:
> jmorton123 wrote:
> > The freeware is free.
>
> > Not the source code.
>
> I maintain: If you could do a bit generalization as I mentioned, your
> software would get a wider acceptance.
>
> M. K. Shen