New Program Makes It Even Easier To Hide & Access Information In Flickr Photos

from the ban-flickr! dept

The practice of hiding data in images -- known as steganography -- is nothing new. People have talked about it for ages, and we've long heard reports of how nefarious organizations used it all the time. But, of course, it can also be used for perfectly good reasons as well -- and now it may have just become a lot easier to use. Glyn Moody points us to the news of a new steganography program that is designed to work easily via Flickr, with the goal of getting news reports to various countries that try to censor the internet. The program, called Collage, supposed makes it quite easy to both encrypt and decrypt information in Flickr photos, knowing that Flickr -- unlike many news sites -- isn't often blocked in countries that censor the internet.

Of course, once word of this program gets out, that could possibly change, but the programmers behind it say they can easily expand it to work with other photo sharing sites as well.

None of this is that surprising, really. In fact, my first reaction on hearing it was to think that this can't be new, as I'm pretty sure other offerings have already allowed such functionality with Flickr. However, it is a nice reminder that every time you try to censor the internet, there will be ways through, and that includes just masking the traffic you want blocked as legitimate traffic, such as Flickr photos.
Hide this

Thank you for reading this Techdirt post. With so many things competing for everyone’s attention these days, we really appreciate you giving us your time. We work hard every day to put quality content out there for our community.

Techdirt is one of the few remaining truly independent media outlets. We do not have a giant corporation behind us, and we rely heavily on our community to support us, in an age when advertisers are increasingly uninterested in sponsoring small, independent sites — especially a site like ours that is unwilling to pull punches in its reporting and analysis.

While other websites have resorted to paywalls, registration requirements, and increasingly annoying/intrusive advertising, we have always kept Techdirt open and available to anyone. But in order to continue doing so, we need your support. We offer a variety of ways for our readers to support us, from direct donations to special subscriptions and cool merchandise — and every little bit helps. Thank you.

–The Techdirt Team

Filed Under: collage, easy, flickr, steganography


Reader Comments

Subscribe: RSS

View by: Time | Thread


  • identicon
    Anonymous Coward, 16 Aug 2010 @ 10:28pm

    It should be noted that it also applies to sound, people can put things inside sounds too, many radio amateurs used a process to send images to others using radio waves.

    http://en.wikipedia.org/wiki/File:Spectrogram_-_Aphex_Twin_-_Windowlicker.png

    People can also use steganography to hide traffic inside traffic on the internet.

    link to this | view in chronology ]

  • identicon
    -x-, 16 Aug 2010 @ 11:14pm

    I for one am glad steganography has found a good use, I always liked the concept but could never quite find a reason to use it :)

    link to this | view in chronology ]

  • identicon
    Andrew D. Todd, 16 Aug 2010 @ 11:39pm

    The Weakness of Steganography.

    Well, I don't know. Suppose the censor sets up a system to automatically degrade every image file by a substantial amount, say the equivalent of fifty or seventy-five percent lossy compression.

    What the censorship in England during the Second World War did was to paraphrase telegram messages, across the board, in order to mess up codes. "Uncle Jim is sick" might become "Uncle James is ill." Of course the censorship could do this because various wartime restrictions were in effect. The government had taken over foreign trade, with a view to economizing on the limited supply of foreign exchange. A business in London was not allowed to buy things from New York, but had to go through a government agency. The result was that things like price lists, which have to be exact, were no longer being transmitted between businesses in different countries. The British government put together a single big order, and decided who got what out of it.

    The way to hide messages in and out of a country is to bundle them in with the business communications. That way, the censor is at risk of messing up the country's export business.

    link to this | view in chronology ]

    • icon
      Blatant Coward (profile), 17 Aug 2010 @ 2:51am

      Re: The Weakness of Steganography.

      HAM radio operators have had programs to send video via sound information for years. The makers of Portal used such a concept to hide ads as "information leaks" for their new product in a recent update to their current game.

      Lossy signal is nothing new for communications, the only thing to do is either repeat the information in a number of places, such as a hidden hash in a 'free to download' program such as a flash game or repeat the signal in a number of pictures in a 'personal' or 'business' website.

      The difficult trick, is getting the decryption information to the receivers on the other end, including 'where are the things to be decrypted found at.' Any method routinely used could be discovered, blocked or used to set traps for the end users with substituted information.

      link to this | view in chronology ]

  • identicon
    Anonymous Coward, 17 Aug 2010 @ 4:30am

    cue the exaggerated outrage when someone realizes this can be used to hide bad stuff.

    link to this | view in chronology ]

    • icon
      Chronno S. Trigger (profile), 17 Aug 2010 @ 5:37am

      Re:

      They use this trick on a few image sharing sites to spread viruses. Pretend it's something people are looking for, make them download it and rename it to .exe or something and open it.

      link to this | view in chronology ]

  • identicon
    Rekrul, 17 Aug 2010 @ 5:37am

    Why does such a program have to be written to "work with" any particular service? As long as the service allows others to save the original, unaltered image, you can use it with any service that allows posting pictures.

    link to this | view in chronology ]

    • icon
      chris (profile), 17 Aug 2010 @ 8:52am

      Re:

      Why does such a program have to be written to "work with" any particular service?

      my guess is for automation purposes, like a one click "stego and post" process, which would be different from sharing site to sharing site.

      link to this | view in chronology ]

  • identicon
    Jim Wingate, 17 Aug 2010 @ 5:43am

    Hidden Audio Files on Flickr

    Steganography is already being used to share pirated music on Flickr by appending the audio file beyond the end of image marker. When opened with an image viewer, only the image is display. However, when opened with an audio player, the music is played.

    link to this | view in chronology ]

  • icon
    AJ (profile), 17 Aug 2010 @ 8:23am

    Could still be dangerous if the steganography is detectable

    If a regime decides to continue to allow Flickr despite this, it sounds like they could use Collage themselves to detect and decode the hidden material. Once they know which pictures contain censored information they log any downloads of those images against the user's IP address and use that as information about who in their own population is reading it. I would want the program to need the right key to even be able to detect that there is hidden material present before I used something like this.

    link to this | view in chronology ]

    • icon
      chris (profile), 17 Aug 2010 @ 9:18am

      Re: Could still be dangerous if the steganography is detectable

      If a regime decides to continue to allow Flickr despite this, it sounds like they could use Collage themselves to detect and decode the hidden material.

      stego can be detected, all you have to do is look for extraneous data in an image file. the problem isn't that it's detectable, it's that services like flickr host billions of files that would have to be checked:

      http://www.citi.umich.edu/u/provos/stego/

      Once they know which pictures contain censored information they log any downloads of those images against the user's IP address and use that as information about who in their own population is reading it.

      the thing with steganography is that you have to know where to look and then apply a method for extraction. if you have the target and extraction method ahead of time it's just a layer of inconvenience, like crypto. if you are an outsider sweeping for steganographic data, you are looking for a needle in a haystack which is potentially sitting in a stack of haystacks.

      if you were to pair this tool with a bunch of compromised/colluding accounts, it would be very difficult to locate the party that is making these materials available. if these accounts are popular, it might also be difficult to locate the parties who are downloading these materials as well. a popular photographer may get thousands of hits per day on his/her photos, and if he/she has thousands of posted photos, it may not be apparent that a photo has been modified.

      I would want the program to need the right key to even be able to detect that there is hidden material present before I used something like this.

      stego isn't undetectable, nor is it unbreakable, but it does do a lot to obscure your activities. the point of stego is to put your payload out in the open. you are hiding your message in plain sight.

      stego also pairs up nicely with crypto: you can embed encrypted data inside an file using steganography, so even if you can find the suspicious image(s), you may not necessarily get the payload.

      link to this | view in chronology ]

  • icon
    btr1701 (profile), 17 Aug 2010 @ 6:25pm

    Just wait...

    ...until some aspiring politician realizes that it's possible to hide a child porn image using steganography and it will become his the next "protect the children" crusade to ban it.

    link to this | view in chronology ]


Follow Techdirt
Essential Reading
Techdirt Deals
Report this ad  |  Hide Techdirt ads
Techdirt Insider Discord

The latest chatter on the Techdirt Insider Discord channel...

Loading...
Recent Stories

This site, like most other sites on the web, uses cookies. For more information, see our privacy policy. Got it
Close

Email This

This feature is only available to registered users. Register or sign in to use it.