Author
Message
xilope
Boot
Joined: 10 Aug 2004 Posts: 11
Re: [Puzzle] Audio Files hiding steganography
pjv2 wrote:
I've been trying to find hidden steg in the individual audio files and couldn't do it.
If the files have something hidden in them it produces a raw PCM file audio and a text file. I couldn't get anything to happen until I used the combined audio clips.
I have successfully decryped the first story(Jersey.mp3) using the passphrase:
dizzyescapejerseyreflecteddurga
It produces the attached jersey.txt file. Can't figure out what this file is supposed to be. Doesn't neccesarily have to be a txt. Could be an image rename or some audio. I'm just not crafty enough to figure it out. So take a crack at it.
Also haven't been able to decode the other 3 mp3s.
Good luck making it work and figuring this out. My girlfriend will kill me if I spend another second on this tonight.
the steg program i use is here:
http://www.cl.cam.ac.uk/~fapp2/steganography/mp3stego/
used this command to decrypt:
decode -X -A -P dizzyescapejerseyreflecteddurga jersey.mp3 jersey.pcm jersey.txt
Looked at the text file last night with my fiancee's laptop. Looked really interesting. Do you have japnese text support on your computer?
Posted: Thu Aug 26, 2004 1:28 pm
pjv2
Boot
Joined: 25 Aug 2004 Posts: 53 Location: Chicago
I like your thinking on Japanese txt. I don't think it is though because of the high incedence of non japanese characters.
It isn't unusual for a gif, jpeg, wav or mp3 to look like japanese text when open in a text editor.
Posted: Thu Aug 26, 2004 2:44 pm
MrMarbles
Greenhorn
Joined: 25 Aug 2004 Posts: 5 Location: Central Florida
I did a hex dump on the text files hoping to find something, but to no avail.
Posted: Thu Aug 26, 2004 4:18 pm
TracerX
Greenhorn
Joined: 25 Aug 2004 Posts: 5
Well, just for grins I ran trid on the jersey.txt and it found no matches which means that the file doesn't match the binary signature of 1198 known filetypes. I'd say its safe to say that it is no image or sound file unless the file header has been removed (or unless we need to decrypt all the files and put them together somehow, who knows).
Edit: yeah, I hex dumped jersey.txt too and while some of the hex proved to be chinese symbols (according to some pl.wikipedia.org unicode list) I couldn't get babblefish to make heads or tails of it.
Posted: Thu Aug 26, 2004 4:18 pm
pjv2
Boot
Joined: 25 Aug 2004 Posts: 53 Location: Chicago
what tool did you use to determine the file types?
I've been messing around trying to dump it into different file headers but nothing will render it yet.
Hopefully we'll hear back on the likelyhood that this is a coincednce soon.
Posted: Thu Aug 26, 2004 4:23 pm
persimmon8
Boot
Joined: 24 Aug 2004 Posts: 14
I've been poking around the original .wavs. The only thing I found that's even slightly interesting steganographically speaking are some of the chunks.
.wav files are broken into chunks. Each chunk has a label. In the axon .wavs, there's a chunk called "fact" (you can see those letters if you load one in a text editor). The next four bytes contain the size of the rest of the chunk: 4 0 0 0, which resolves to "4". The next four bytes are the remainder of the "fact" chunk, and they're different in every .wav file.
The "fact" chunk is only necessary when the audio data has been compressed using certain codecs. The codec for these .wavs doesn't need it. In fact, if you take out the "fact" chunk (all 12 bytes of it), the files play just fine.
Also, if the "fact" chunk were *actually* giving information about the compression method, it would probably be the same for all the files, but it's not.
So: this could all be the result of some audio software that puts "fact" chunks in whether or not they're needed. Or, it could be a clue. Since they're "fact" chunks, and the Queen is searching for the truth, there's at least a tenuous link.
- Per
Posted: Thu Aug 26, 2004 4:49 pm
TracerX
Greenhorn
Joined: 25 Aug 2004 Posts: 5
Interesting find there on the fact chunk. Maybe if we pulled all of them out, something might turn up in at least one of them that could lead us to what to look for in the others.
As for what program I used, it is called trid http://mark0.ngi.it/soft-trid-e.html . However, my guess would be that if the header is missing that this program would be incapable of matching the file signatures so that may be the problem.
Posted: Thu Aug 26, 2004 5:00 pm
pjv2
Boot
Joined: 25 Aug 2004 Posts: 53 Location: Chicago
did some quick research on audio codecs and the fact chuck. It seems that it is only optional for non-compressed formats. In compressed formats the 4-byte word tells the program the run time of the file.
Posted: Thu Aug 26, 2004 5:19 pm
ElViento
Boot
Joined: 25 Aug 2004 Posts: 37
Chinese symbols?
Dana is in China
Posted: Thu Aug 26, 2004 5:55 pm
msekolpsu
Veteran
Joined: 03 Aug 2004 Posts: 119
That's a good observation. Anybody here read Chinese? Go download the file!
_________________"Oww! They're defending themselves somehow." – Homer, while being stung by bees
Posted: Thu Aug 26, 2004 6:51 pm
Antiarc
Boot
Joined: 25 Aug 2004 Posts: 62
On a hunch, given the AIs' fondness for "steno" in the distorted webcam images, I'm looking at all the data as raw image data. The few mp3 files I've looked at haven't yielded anything, nor have the decoded wavs, or the steno files pulled from the mp3s. However, I've just scratched the surface of the files, so if someone else wants to pursue this angle as well, it might be worth trying.
Additionally, has anyone tried wrapping those files in .wav headers and playing them?
Posted: Thu Aug 26, 2004 7:27 pm
pjv2
Boot
Joined: 25 Aug 2004 Posts: 53 Location: Chicago
I tried inserting them into wave headers with no success. I really didn't know what I was doing though.
Also tried it with image formats.
the jersey.txt file loads as a raw with the correct dimensions, but it don't think this is really signifigant.
Posted: Thu Aug 26, 2004 8:05 pm
sherpa
Unfettered
Joined: 10 Aug 2004 Posts: 338 Location: cam.ac.uk
Antiarc wrote:
.. given the AIs' fondness for "steno" in the distorted webcam images, ...
Just a few things to (hopefully) correct some of the misinformation and misinterpretations I've seen bandied about a lot recently. Antiarc, this isn't aimed at you in particular, don't worry I've seen a lot of people do the same.
Firstly, it's "stego", not "steno". Short for steganography - not stenography ! The former is hiding messages, the latter shorthand writing. Google for 'steno steganography' and 'stego steganography' if you want to gauge the popularity of these abbreviations - amusingly an ILB site is second on the list, for the 'steno' search, just showing how deeply rooted this misconception and misuse is. Please stop butchering the language like this and use "stego" if you must use a shorthand! (And yes, it's easy to forget in the heat of the moment, and I'm sure I've done it too here -- if someone does use the wrong word, don't come down too hard on 'em, eh?)
Secondly, for those of you who aren't quite sure what steganography is, go and check out the Wikipedia article , or similar sources. It's the art of hiding a message so that nobody knows it's there unless they are purposefully looking (i.e. are the recipient). The messages crudely embedded in images across the site are not steganographed. They are not hidden, as it is blindingly obvious that they are there, and trivial to retrieve them. However, embedding messages in the WAV files would be steganography, because the original files play as if there is no message (i.e. there isn't any distortion, the files do play rather than come out corrupted, etc) - because of the capacity for noise, it's easy to hide messages this way. If the jphide/jpseek methods used previously on various site images had worked, they would also be steganography.
Anyway, carry on as you were folks This public service announcement is now over.
_________________stercus, stercus, moriturus sum!
~ a girl of many names ~
Posted: Fri Aug 27, 2004 5:19 am
pjv2
Boot
Joined: 25 Aug 2004 Posts: 53 Location: Chicago
sherpa wrote:
Anyway, carry on as you were folks This public service announcement is now over.
All very good points sherpa. Have you been able to determine what the likelyhood of these files decoding with these passwords is?
It seems to me to be rather low.
You said you are in the same lab as the author(s), can you talk to them?
Posted: Fri Aug 27, 2004 10:37 am
Antiarc
Boot
Joined: 25 Aug 2004 Posts: 62
Doh >_<
I knew that. I consider myself duly corrected.
Posted: Fri Aug 27, 2004 12:51 pm
Display posts from previous: All Posts 1 Day 1 Week 2 Weeks 1 Month 3 Months 6 Months 1 Year Sort by: Post Time Post Subject Author Ascending Descending