[Message Deleted] [modified]
-
Mr.Balkany : Thankyou for ur message.Sir I am from Bangladesh and i am a novice in software development in compared to you and my knowledge is very limited.So i am knocking ur door to render me some help on this issue.Sir below i am mentioning the aspects of my technic: 1.The size of the carrier text file does not change even by a single byte after hiding the data. 2.Not a single readable/printable letter of the carrier text file is changed/replaced/distorted. 3.You will notice absolutely no change whatsoever as far as reading the file is concerned. Considering the above points do u think that my technic is unique? Sir,if my technic is unique then what should i do with it?Can you plse guide me? As my knowledge is very limited,i am really confused by all the remarks i got till now.
modified on Friday, March 21, 2008 6:15 AM
Hey Pallab, have you the samples of text file and its twin with hidden information inside you promised yesterday?
If the Lord God Almighty had consulted me before embarking upon the Creation, I would have recommended something simpler. -- Alfonso the Wise, 13th Century King of Castile.
This is going on my arrogant assumptions. You may have a superb reason why I'm completely wrong. -- Iain Clarke -
Pallab_GT wrote:
If a character is not readable/invisible in MS-WORD/WORDPAD/NOTEPAD using all the english (cause i have tried it only using english fonts) font,will you consider that character readable/printable?
what he is saying is that he, or I, or anyone desiring to see unprintable characters can look at them at a moments notice anytime we choose to. All characters, all ASCII codes from 0 to 255 are readable to a person who knows what they are doing. You may change the space to a hex 00 or higher order hex, but if I know what I am doing I will see it. More to the point "diff" works at both the character and binary level, so it will see that a change has been made and highlight every single change. I miss out on all the fun discussions.... :( I missed this until now....
_________________________ Asu no koto o ieba, tenjo de nezumi ga warau. Talk about things of tomorrow and the mice in the ceiling laugh. (Japanese Proverb)
Sir,if u check other data hiding softwares i think you will the difference between my technic and the conventional technics that r in use. The whole point is obscuring the data in a text file so that even if the file is intercepted during transfering the file over a network,it should not be noticeable easily that some data is hidden inside the file.
-
Hey Pallab, have you the samples of text file and its twin with hidden information inside you promised yesterday?
If the Lord God Almighty had consulted me before embarking upon the Creation, I would have recommended something simpler. -- Alfonso the Wise, 13th Century King of Castile.
This is going on my arrogant assumptions. You may have a superb reason why I'm completely wrong. -- Iain Clarke -
Pallab: Your algorithm is unique if it really does what you say. I have a fair amount of experience with algorithms in general, and data compression and encryption in particular, and I've never heard of an algorithm that can do what you say. I'm not saying it's impossible; I've seen some very clever algorithms that do amazing things. You really shouldn't reveal the details until you get it patented. It potentially has value, and if you publicly disclose how it works you won't be able to patent it later. I don't know if you're in the US, but in the US you can get an inexpensive provisional patent that will give you a year to turn it into a more rigorous 20-year patent.
-
Yes sir,I have my promise on my mind and i promise to give u the file.Sir just give me sometime.Plse bear with me.
I will wait for with trepidation. :)
If the Lord God Almighty had consulted me before embarking upon the Creation, I would have recommended something simpler. -- Alfonso the Wise, 13th Century King of Castile.
This is going on my arrogant assumptions. You may have a superb reason why I'm completely wrong. -- Iain Clarke -
I will wait for with trepidation. :)
If the Lord God Almighty had consulted me before embarking upon the Creation, I would have recommended something simpler. -- Alfonso the Wise, 13th Century King of Castile.
This is going on my arrogant assumptions. You may have a superb reason why I'm completely wrong. -- Iain ClarkeSir,Learned man like you will for paper with trepidation from a man like me,I am really overwhelmed.Sir i will ask a little more than a week time from you.Cause before i give my proof to you i want be absolutely sure that my technic works in all possible scenario.By 30th March i will be able to give u the proof.Is that ok with you?
-
Sir,Learned man like you will for paper with trepidation from a man like me,I am really overwhelmed.Sir i will ask a little more than a week time from you.Cause before i give my proof to you i want be absolutely sure that my technic works in all possible scenario.By 30th March i will be able to give u the proof.Is that ok with you?
OK. I will wait with increased trepidation. :)
If the Lord God Almighty had consulted me before embarking upon the Creation, I would have recommended something simpler. -- Alfonso the Wise, 13th Century King of Castile.
This is going on my arrogant assumptions. You may have a superb reason why I'm completely wrong. -- Iain Clarke -
Sir,if u check other data hiding softwares i think you will the difference between my technic and the conventional technics that r in use. The whole point is obscuring the data in a text file so that even if the file is intercepted during transfering the file over a network,it should not be noticeable easily that some data is hidden inside the file.
Pallab_GT wrote:
Sir,if u check other data hiding softwares i think you will the difference between my technic and the conventional technics that r in use. The whole point is obscuring the data in a text file so that even if the file is intercepted during transfering the file over a network,it should not be noticeable easily that some data is hidden inside the file.
I am fully aware of the other programs, and as I understand the issue at hand, you are misleading yourself. If you change any white space to a character other than the original white space, you are instantly obvious about the change. You may not see it in notepad, but upon review of the text, it is immediately obvious. If you qualify your algorithm as hiding only from a computer illiterate, I would understand that it would work perfectly, so would many messages. But upon any change to a so-called "non-printable character" can be and is very visible to most of us here.
_________________________ Asu no koto o ieba, tenjo de nezumi ga warau. Talk about things of tomorrow and the mice in the ceiling laugh. (Japanese Proverb)
-
Pallab_GT wrote:
If a character is not readable/invisible in MS-WORD/WORDPAD/NOTEPAD using all the english (cause i have tried it only using english fonts) font,will you consider that character readable/printable?
what he is saying is that he, or I, or anyone desiring to see unprintable characters can look at them at a moments notice anytime we choose to. All characters, all ASCII codes from 0 to 255 are readable to a person who knows what they are doing. You may change the space to a hex 00 or higher order hex, but if I know what I am doing I will see it. More to the point "diff" works at both the character and binary level, so it will see that a change has been made and highlight every single change. I miss out on all the fun discussions.... :( I missed this until now....
_________________________ Asu no koto o ieba, tenjo de nezumi ga warau. Talk about things of tomorrow and the mice in the ceiling laugh. (Japanese Proverb)
El Corazon wrote:
I miss out on all the fun discussions.... I missed this until now....
I think this is the first time I've actually spent in this forum .. I've really missed out on some crackpot discussions. Sounds like someones got the wrong handle on steganography.
I'm largely language agnostic
After a while they all bug me :doh:
-
El Corazon wrote:
I miss out on all the fun discussions.... I missed this until now....
I think this is the first time I've actually spent in this forum .. I've really missed out on some crackpot discussions. Sounds like someones got the wrong handle on steganography.
I'm largely language agnostic
After a while they all bug me :doh:
This is the longest discussion about nothing that I can recall. I'm sure some punctuation in the above would help, but in the spirit of the thread..
Peter "Until the invention of the computer, the machine gun was the device that enabled humans to make the most mistakes in the smallest amount of time."
-
El Corazon wrote:
I miss out on all the fun discussions.... I missed this until now....
I think this is the first time I've actually spent in this forum .. I've really missed out on some crackpot discussions. Sounds like someones got the wrong handle on steganography.
I'm largely language agnostic
After a while they all bug me :doh:
-
I can't see who you are asking, but if you are asking me what my point was, I would summarise this thread as being about a simple data obscuration technique that may be useful for your purpose. As it is easily detected it doesn't appear to be of any great general interest. You ask in your first post:
Pallab_GT wrote:
Guys can you plse tell me if this techniq has already been implemented the way i have done it
The answer to this is that it has almost certainly been done somewhere by someone, but really - who cares? Is it a commonly known/used technique - no. I suspect that you are asking this question thinking that you have invented something (possibly of value). Whilst I encourage you to continue to try to develop new and interesting ideas, this one is no world beater. Unless you have the killer application in mind, use it to impress your friends by hiding data in text files and move on.
Peter "Until the invention of the computer, the machine gun was the device that enabled humans to make the most mistakes in the smallest amount of time."
-
Can you plse give me your emailid so that i can discuss some more with u.I want to keep our discussions secret.
Just post a message for me here with hidden text. ;)
-
Hi guys...I am from Bangladesh and my knowledge is very limited.I have developed an algorithm using which any data can be hidden in a text file.After hiding the data in the text file,the size of the text file remains absolutely unchanged and there is no change whatsoever in the file's content as far as reading the file is concerned.I know there r lots of data hiding techniques.Guys can you plse tell me if this techniq has already been implemented the way i have done it...I mean hiding the data in a text file without changing the file size even by a single byte and you wont see a single replacement/change/distortion in any of the letters of the file.As far as reading the file is concerned...the file will remain 100% unchanged even after hiding the data in it.
modified on Tuesday, March 18, 2008 8:42 PM
The sneakest (well, not the sneakest - the sneakest way is to write a filesystem driver that modifies the information presented to the OS) way that I know of doing something like this is to use an alternate file/data stream. This effectively hides data from the "naked eye", and its takes a little know-how to get at the streams. Have a look here: http://www.heysoft.de/Frames/f_faq_ads_en.htm[^] for more information. Peace!
-=- James
Please rate this message - let me know if I helped or not! * * *
If you think it costs a lot to do it right, just wait until you find out how much it costs to do it wrong!
Remember that Professional Driver on Closed Course does not mean your Dumb Ass on a Public Road!
See DeleteFXPFiles -
Well Sir,if you comapare the text files(prior and post hiding data versions) bit by bit...there will be obviously some chages.But that change will have no impact whatsoever in any of the readable/printable letters of the file.Not even a single readable/printable letter will be changed/replaced or distorted.Plse note my emphasise on readable/printable letters.There will be some changes in the file in binary level.But,i say again that change in binary level will have no impact whatsoever in the readable/printable letters of the text file,the readable/printable letters will remain absolutely the same as they were before hiding the data.And the size of the file will also remain absolutely unchanged.The size will not change even by a single byte. Considering the above...do u still think its impossible? Sir,does it really matter if somebody tells me something because of my persistance?The question is if i can honour what i am saying? I know very little about software development and i sincerely consider you people far more learned than me.That why i am just asking u people if this techniq has already been implemented the way i am claiming it.
One thing you're ignoring that the space character IS a READABLE/PRINTABLE character. Just replacing the space with some other non-printable character is not going to work. At least, not within the parameters you've specified. Seriously, with the spec's that you've laid out, what you want to do just isn't possible. There is simply not enough bits available to play with to make the technique usable for anything other than very short messages. This is why you just don't see the technique being used.
A guide to posting questions on CodeProject[^]
Dave Kreskowiak Microsoft MVP Visual Developer - Visual Basic
2006, 2007 -
Just post a message for me here with hidden text. ;)
LOL. This is the funniest thread I have ever read. Did anyone notice the hidden poem?
-
Can you plse tell me...is it something new if i can hide data inside a text file without changing the fle size even by a single byte and without replacing/changing/distorting any of the readable/printable letters of the file
Short answer, it is possible to, “hide data inside a text file without changing the fle size even by a single byte and without replacing/changing/distorting any of the readable/printable letters of the file”. But the characters would not be readable at that time the “hidden” data is in there. Of course you need a mask data stream to extract the “hidden” data from the real/actual (what ever you want to call it) data. The question here is why??? :confused: If you want to encrypt/hide the data then use a real encryption algorithm. It would be far more secure then simple hide and seek protocol.