New Program Makes It Even Easier To Hide & Access Information In Flickr Photos

from the ban-flickr! dept

The practice of hiding data in images -- known as steganography -- is nothing new. People have talked about it for ages, and we've long heard reports of how nefarious organizations used it all the time. But, of course, it can also be used for perfectly good reasons as well -- and now it may have just become a lot easier to use. Glyn Moody points us to the news of a new steganography program that is designed to work easily via Flickr, with the goal of getting news reports to various countries that try to censor the internet. The program, called Collage, supposed makes it quite easy to both encrypt and decrypt information in Flickr photos, knowing that Flickr -- unlike many news sites -- isn't often blocked in countries that censor the internet.

Of course, once word of this program gets out, that could possibly change, but the programmers behind it say they can easily expand it to work with other photo sharing sites as well.

None of this is that surprising, really. In fact, my first reaction on hearing it was to think that this can't be new, as I'm pretty sure other offerings have already allowed such functionality with Flickr. However, it is a nice reminder that every time you try to censor the internet, there will be ways through, and that includes just masking the traffic you want blocked as legitimate traffic, such as Flickr photos.


Reader Comments (rss)

(Flattened / Threaded)

  1.  
    identicon
    Anonymous Coward, Aug 16th, 2010 @ 10:28pm

    It should be noted that it also applies to sound, people can put things inside sounds too, many radio amateurs used a process to send images to others using radio waves.

    http://en.wikipedia.org/wiki/File:Spectrogram_-_Aphex_Twin_-_Windowlicker.png

    People can also use steganography to hide traffic inside traffic on the internet.

     

    reply to this | link to this | view in thread ]

  2.  
    identicon
    -x-, Aug 16th, 2010 @ 11:14pm

    I for one am glad steganography has found a good use, I always liked the concept but could never quite find a reason to use it :)

     

    reply to this | link to this | view in thread ]

  3.  
    identicon
    Andrew D. Todd, Aug 16th, 2010 @ 11:39pm

    The Weakness of Steganography.

    Well, I don't know. Suppose the censor sets up a system to automatically degrade every image file by a substantial amount, say the equivalent of fifty or seventy-five percent lossy compression.

    What the censorship in England during the Second World War did was to paraphrase telegram messages, across the board, in order to mess up codes. "Uncle Jim is sick" might become "Uncle James is ill." Of course the censorship could do this because various wartime restrictions were in effect. The government had taken over foreign trade, with a view to economizing on the limited supply of foreign exchange. A business in London was not allowed to buy things from New York, but had to go through a government agency. The result was that things like price lists, which have to be exact, were no longer being transmitted between businesses in different countries. The British government put together a single big order, and decided who got what out of it.

    The way to hide messages in and out of a country is to bundle them in with the business communications. That way, the censor is at risk of messing up the country's export business.

     

    reply to this | link to this | view in thread ]

  4.  
    icon
    Blatant Coward (profile), Aug 17th, 2010 @ 2:51am

    Re: The Weakness of Steganography.

    HAM radio operators have had programs to send video via sound information for years. The makers of Portal used such a concept to hide ads as "information leaks" for their new product in a recent update to their current game.

    Lossy signal is nothing new for communications, the only thing to do is either repeat the information in a number of places, such as a hidden hash in a 'free to download' program such as a flash game or repeat the signal in a number of pictures in a 'personal' or 'business' website.

    The difficult trick, is getting the decryption information to the receivers on the other end, including 'where are the things to be decrypted found at.' Any method routinely used could be discovered, blocked or used to set traps for the end users with substituted information.

     

    reply to this | link to this | view in thread ]

  5.  
    identicon
    Anonymous Coward, Aug 17th, 2010 @ 4:30am

    cue the exaggerated outrage when someone realizes this can be used to hide bad stuff.

     

    reply to this | link to this | view in thread ]

  6.  
    identicon
    Rekrul, Aug 17th, 2010 @ 5:37am

    Why does such a program have to be written to "work with" any particular service? As long as the service allows others to save the original, unaltered image, you can use it with any service that allows posting pictures.

     

    reply to this | link to this | view in thread ]

  7.  
    icon
    Chronno S. Trigger (profile), Aug 17th, 2010 @ 5:37am

    Re:

    They use this trick on a few image sharing sites to spread viruses. Pretend it's something people are looking for, make them download it and rename it to .exe or something and open it.

     

    reply to this | link to this | view in thread ]

  8.  
    identicon
    Jim Wingate, Aug 17th, 2010 @ 5:43am

    Hidden Audio Files on Flickr

    Steganography is already being used to share pirated music on Flickr by appending the audio file beyond the end of image marker. When opened with an image viewer, only the image is display. However, when opened with an audio player, the music is played.

     

    reply to this | link to this | view in thread ]

  9.  
    icon
    AJ (profile), Aug 17th, 2010 @ 8:23am

    Could still be dangerous if the steganography is detectable

    If a regime decides to continue to allow Flickr despite this, it sounds like they could use Collage themselves to detect and decode the hidden material. Once they know which pictures contain censored information they log any downloads of those images against the user's IP address and use that as information about who in their own population is reading it. I would want the program to need the right key to even be able to detect that there is hidden material present before I used something like this.

     

    reply to this | link to this | view in thread ]

  10.  
    icon
    chris (profile), Aug 17th, 2010 @ 8:52am

    Re:

    Why does such a program have to be written to "work with" any particular service?

    my guess is for automation purposes, like a one click "stego and post" process, which would be different from sharing site to sharing site.

     

    reply to this | link to this | view in thread ]

  11.  
    icon
    chris (profile), Aug 17th, 2010 @ 9:18am

    Re: Could still be dangerous if the steganography is detectable

    If a regime decides to continue to allow Flickr despite this, it sounds like they could use Collage themselves to detect and decode the hidden material.

    stego can be detected, all you have to do is look for extraneous data in an image file. the problem isn't that it's detectable, it's that services like flickr host billions of files that would have to be checked:

    http://www.citi.umich.edu/u/provos/stego/

    Once they know which pictures contain censored information they log any downloads of those images against the user's IP address and use that as information about who in their own population is reading it.

    the thing with steganography is that you have to know where to look and then apply a method for extraction. if you have the target and extraction method ahead of time it's just a layer of inconvenience, like crypto. if you are an outsider sweeping for steganographic data, you are looking for a needle in a haystack which is potentially sitting in a stack of haystacks.

    if you were to pair this tool with a bunch of compromised/colluding accounts, it would be very difficult to locate the party that is making these materials available. if these accounts are popular, it might also be difficult to locate the parties who are downloading these materials as well. a popular photographer may get thousands of hits per day on his/her photos, and if he/she has thousands of posted photos, it may not be apparent that a photo has been modified.

    I would want the program to need the right key to even be able to detect that there is hidden material present before I used something like this.

    stego isn't undetectable, nor is it unbreakable, but it does do a lot to obscure your activities. the point of stego is to put your payload out in the open. you are hiding your message in plain sight.

    stego also pairs up nicely with crypto: you can embed encrypted data inside an file using steganography, so even if you can find the suspicious image(s), you may not necessarily get the payload.

     

    reply to this | link to this | view in thread ]

  12.  
    icon
    btr1701 (profile), Aug 17th, 2010 @ 6:25pm

    Just wait...

    ...until some aspiring politician realizes that it's possible to hide a child porn image using steganography and it will become his the next "protect the children" crusade to ban it.

     

    reply to this | link to this | view in thread ]


Add Your Comment

Have a Techdirt Account? Sign in now. Want one? Register here
Get Techdirt’s Daily Email
Save me a cookie
  • Note: A CRLF will be replaced by a break tag (<br>), all other allowable HTML will remain intact
  • Allowed HTML Tags: <b> <i> <a> <em> <br> <strong> <blockquote> <hr> <tt>
Follow Techdirt
A word from our sponsors...
Essential Reading
Techdirt Reading List
Techdirt Insider Chat
A word from our sponsors...
Recent Stories
A word from our sponsors...

Close

Email This