-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathoutguess.1
187 lines (187 loc) · 4.53 KB
/
outguess.1
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
.\" outguess manpage, converted from README
.\" dugsong@monkey.org
.TH OUTGUESS 1 "1 May 2000"
.SH NAME
outguess - universal steganographic tool
.SH SYNOPSIS
.B outguess
[
.B \-emt
] [
.B \-r
] [
.B \-k
.I key
] [
.B \-F
[+-]
] [
.B \-d
.I datafile
] [
.B \-s
.I seed
] [
.B \-i
.I limit
] [
.B \-x
.I maxkeys
] [
.B \-p
.I param
] [
.I inputfile
[
.I outputfile
]]
.LP
.SH DESCRIPTION
.LP
.I Outguess
is a universal steganographic tool that allows the insertion
of hidden information into the redundant bits of data sources. The
nature of the data source is irrelevant to the core of
.IR outguess .
The program relies on data specific handlers that will extract
redundant bits and write them back after modification. Currently only
the PPM, PNM, and JPEG image formats are supported, although
.I outguess
could use any kind of data, as long as a handler were provided.
.PP
.I Outguess
uses a generic iterator object to select which bits in the data should
be modified. A seed can be used to modify the behavior of the
iterator. It is embedded in the data along with the rest of the
message. By altering the seed,
.I outguess
tries to find a sequence of bits that minimizes the number of changes
in the data that have to be made.
.PP
A bias is introduced that favors the modification of bits that were
extracted from a high value, and tries to avoid the modification of
bits that were extracted from a low value.
.PP
Additionally,
.I Outguess
allows for the hiding of two distinct messages in the data, thus
providing plausible deniablity. It keeps track of the bits that have
been modified previously and locks them. A (23,12,7) Golay code is
used for error correction to tolerate collisions on locked bits.
Artifical errors are introduced to avoid modifying bits that have a
high bias.
.SH OPTIONS
.LP
The following command line options, when specified as capital letters,
indicate options for the second message.
.TP
.B \-F \fI[+-]\fR
Specifies that OutGuess should preserve statistics based on frequency
counts. As a result, no statistical test that is based on frequency
counts will be able to detect steganographic content. This option is
on by default.
.TP
.B \-kK \fIkey\fR
Specify the secret key used to encrypt and hide the message in the
provided data.
.TP
.B \-dD \fIdatafile\fR
Specify the filename containing a message to be hidden in the data.
.TP
.B \-sS \fIseed\fR
Specify the initial seed the iterator object uses for selecting bits
in the redundant data. If no upper limit is specified, the iterator
will use this seed without searching for a more optimal embedding.
.TP
.B \-iI \fIlimit\fR
Specify the upper limit for finding an optimal iterator seed. The
maximum value for the limit is 65535.
.TP
.B \-eE
Use error correction for data encoding and decoding.
.PP
Other options that apply to the general execution of
.IR outguess :
.TP
.B \-r
Retrieve a message from a data object. If this option is not
specified,
.I outguess
will embed messages.
.TP
.B \-x \fImaxkeys\fR
If the second key does not create an iterator object
that is successful in embedding the data, the program
will derive up to specified number of new keys.
.TP
.B \-p \fIparam\fR
Passes a string as parameter to the destination data handler. For the
JPEG image format, this is the compression quality, it can take values
between 75 and 100. The higher the quality the more bits to hide a
message in the data are available.
.TP
.B \-m
Mark pixels that have been modified.
.TP
.B \-t
Collect statistics about redundant bit usage. Repeated use increases
output level.
.PP
For embedding messages, you need to specify a source and a destination
filename.
.I Outguess
determines the data format by the filename extension. If no filenames
are specified
.I outguess
operates as a filter and assumes the PPM data format.
.SH EXAMPLES
.LP
To embed the message
.I hidden.txt
into the
.I monkey.jpg
image:
.IP
.B outguess \-k
"my secret pass phrase"
.B \-d
.I hidden.txt monkey.jpg out.jpg
.PP
And in the other direction:
.IP
.B outguess \-k
"my secret pass phrase"
.B \-r
.I out.jpg message.txt
.PP
will retrieve the hidden message from the image.
.PP
If you want to embed a second message, use:
.IP
.B outguess \-k
"secret1"
.B \-d
.I hide1.txt
.B \-E \-K
"secret2"
.B \-D
.I hide2.txt monkey.jpg out.jpg
.PP
.I Outguess
will first embed
.I hide1.txt
and then
.I hide2.txt
on top of it, using error correcting codes. The second message
.I hide2.txt
can be retrieved with
.IP
.B outguess \-k
"secret2"
.B \-e \-r
.I out.jpg message.txt
.LP
.SH "SEE ALSO"
cjpeg(1), djpeg(1), pnm(5), stirmark(1)
.SH AUTHOR
Niels Provos <provos@citi.umich.edu>