//
archives

scraping

This tag is associated with 17 posts

Audio Steganography PT5: Estimating Size of Data Hidden by MP3Stego

Analyzing the size of the hidden information After confirming MP3Stego encoder, the size of the hidden information can be determined by calculating the changes of block length’ variance, because the variance changes obviously between the mp3 data with or without information-hiding. Let x denote the block length, and ∑x denote the summation of n blocks … Continue reading

Audio Steganography PT4: detecting MP3Stego

A new method to detect MP3Stego When encoding a MP3 file, the frame length is in byte according to the bit stream format, but at the time of quantization and encoding, the Main Data is a bit stream. So when data is packed to frames, it may produce 1 to 7 padding bits to satisfy … Continue reading

Audio Steganography PT3: Understanding MP3Stego’s Technique

MP3Stego’s Information-hiding method was the research result of the Fraunhofer-IIS Institute. The MP3 audio encoding process is shown in Figure 1. The important parts that carry out the MP3 encoding are the two loops. The inner loop is a quantization and encoding loop. If the bits produced by quantization and encoding exceed the available max_length … Continue reading

Audio Steganography PT2: Attacking MP3Stego

MP3Stego was developed by Cambridge University for the purpose of hiding information in MP3s. While being a purely academic exercise I am sure, its source code and binaries are available online, and have been used as the basis of a lot of steganographic programs. As MP3 is the most commonly distributed music format, using the … Continue reading

Audio Steganography PT1: Using MP3Stego

How to Hide data (Steganography) into MP3 file – mp3stego Steganography is the art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message, a form of security through obscurity MP3Stego will hide information in MP3 files during the … Continue reading

Mass Social Network Ease of Use Vulnerability: Pt 5 Monster

Disclosure of usernames has long been considered a security vulnerability of equal importance as a password. Security experts recommend avoiding the use of admin and root as usernames, and we can even see that practice taken to heart with leaks like Gawker. Administrators and users especially consider the password the only part that of the … Continue reading

Mass Social Network Ease of Use Vulnerability: Pt 4 MySpace

Disclosure of usernames has long been considered a security vulnerability of equal importance as a password. Security experts recommend avoiding the use of admin and root as usernames, and we can even see that practice taken to heart with leaks like Gawker. Administrators and users especially consider the password the only part that of the … Continue reading

Mass Social Network Ease of Use Vulnerability: Pt 3 Scribd

Disclosure of usernames has long been considered a security vulnerability of equal importance as a password. Security experts recommend avoiding the use of admin and root as usernames, and we can even see that practice taken to heart with leaks like Gawker. Administrators and users especially consider the password the only part that of the … Continue reading

Mass Social Network Ease of Use Vulnerability: Pt 2 Twitter

Disclosure of usernames has long been considered a security vulnerability of equal importance as a password. Security experts recommend avoiding the use of admin and root as usernames, and we can even see that practice taken to heart with leaks like Gawker. Administrators and users especially consider the password the only part that of the … Continue reading

Mass Social Network Ease of Use Vulnerability: Pt 1 Facebook

Disclosure of usernames has long been considered a security vulnerability of equal importance as a password. Security experts recommend avoiding the use of admin and root as usernames, and we can even see that practice taken to heart with leaks like Gawker. Administrators and users especially consider the password the only part that of the … Continue reading