<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>http://en.zaoniao.it/index.php?action=history&amp;feed=atom&amp;title=OpenPuff</id>
	<title>OpenPuff - Revision history</title>
	<link rel="self" type="application/atom+xml" href="http://en.zaoniao.it/index.php?action=history&amp;feed=atom&amp;title=OpenPuff"/>
	<link rel="alternate" type="text/html" href="http://en.zaoniao.it/index.php?title=OpenPuff&amp;action=history"/>
	<updated>2026-05-15T09:20:30Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.32.0</generator>
	<entry>
		<id>http://en.zaoniao.it/index.php?title=OpenPuff&amp;diff=2472&amp;oldid=prev</id>
		<title>Admin: Created page with &quot;'''OpenPuff Steganography and Watermarking''', sometimes abbreviated '''OpenPuff''' or '''Puff''', is a freeware steganography tool for Microsoft Windows created by Co...&quot;</title>
		<link rel="alternate" type="text/html" href="http://en.zaoniao.it/index.php?title=OpenPuff&amp;diff=2472&amp;oldid=prev"/>
		<updated>2019-03-23T07:38:56Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;&amp;#039;&amp;#039;&amp;#039;OpenPuff Steganography and Watermarking&amp;#039;&amp;#039;&amp;#039;, sometimes abbreviated &amp;#039;&amp;#039;&amp;#039;OpenPuff&amp;#039;&amp;#039;&amp;#039; or &amp;#039;&amp;#039;&amp;#039;Puff&amp;#039;&amp;#039;&amp;#039;, is a &lt;a href=&quot;/index.php?title=Freeware&amp;amp;action=edit&amp;amp;redlink=1&quot; class=&quot;new&quot; title=&quot;Freeware (page does not exist)&quot;&gt;freeware&lt;/a&gt; steganography tool for &lt;a href=&quot;/index.php?title=Microsoft_Windows&amp;amp;action=edit&amp;amp;redlink=1&quot; class=&quot;new&quot; title=&quot;Microsoft Windows (page does not exist)&quot;&gt;Microsoft Windows&lt;/a&gt; created by Co...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;'''OpenPuff Steganography and Watermarking''', sometimes abbreviated '''OpenPuff''' or '''Puff''', is a [[freeware]] steganography tool for [[Microsoft Windows]] created by Cosimo Oliboni and still maintained as independent software. The program is notable for being the first [[Steganography tools|steganography tool]] (version 1.01 released on December 2004) that:&lt;br /&gt;
* lets users hide data in more than a single carrier file. When hidden data are split among a set of carrier files you get a carrier chain, with no enforced hidden data theoretical size limit (256MB, 512MB, ... depending only on the implementation)&lt;br /&gt;
* implements 3 layers of hidden data [[obfuscation]] ([[cryptography]], [[Decorrelation|whitening]] and [[Covering space|encoding]])&lt;br /&gt;
* extends [[Deniable encryption|deniable cryptography]] into deniable steganography&lt;br /&gt;
&lt;br /&gt;
Last revision supports a wide range of carrier formats&lt;br /&gt;
* Images [[Windows bitmap|Bmp]], [[JPG|Jpg]], [[Portable Network Graphics|Png]], [[Truevision TGA|Tga]]&lt;br /&gt;
* Audios [[Aiff]], [[Mp3]], [[WAV|Wav]]&lt;br /&gt;
* Videos [[3gp]], [[Mp4]], [[MPEG-1|Mpeg I]], [[MPEG-2|Mpeg II]], [[VOB|Vob]]&lt;br /&gt;
* Flash-Adobe [[FLV|Flv]], [[Pdf]], [[SWF|Swf]]&lt;br /&gt;
&lt;br /&gt;
==Use==&lt;br /&gt;
&lt;br /&gt;
OpenPuff is used primarily for anonymous asynchronous data sharing:&lt;br /&gt;
* the sender hides a hidden stream inside some public available carrier files (''password'' + ''carrier files'' + ''carrier order'' are the [[Private key cryptography|secret key]])&lt;br /&gt;
* the receiver unhides the hidden stream knowing the secret key&lt;br /&gt;
&lt;br /&gt;
The advantage of [[steganography]], over cryptography alone, is that messages do not attract attention to themselves. Plainly visible encrypted messages — no matter how unbreakable — will arouse suspicion, and may in themselves be incriminating in countries where encryption is illegal. Therefore, whereas cryptography protects the contents of a message, steganography can be said to protect both messages and communicating parties.&lt;br /&gt;
&lt;br /&gt;
[[Digital watermarking|Watermarking]] is the action of signing a file with an ID or copyright mark. OpenPuff does it in an invisible steganographic way, applied to any supported carrier. The invisible mark, being not password protected, is accessible by everyone (using the program).&lt;br /&gt;
&lt;br /&gt;
==Multi-cryptography==&lt;br /&gt;
&lt;br /&gt;
OpenPuff is a semi-open source program:&lt;br /&gt;
* cryptography, [[CSPRNG]], [[Cryptographic hash function|hashing]] (used in password hexadecimal extension), and scrambling are open source&lt;br /&gt;
&lt;br /&gt;
Cryptographic algorithms (16 taken from [[Advanced Encryption Standard process|AES]], [[NESSIE]] and [[CRYPTREC]]) are joined into a unique multi-cryptography algorithm:&lt;br /&gt;
* keys and internal static data are initialized for each algorithm '''f'''&lt;br /&gt;
* each data block '''D [ i ]''' (128bit) will be encrypted using a different algorithm '''f [ i ]'''&lt;br /&gt;
* '''f [ i ]''' is chosen with a [[Random oracle|pseudorandom oracle]], seeded with a second independent password&lt;br /&gt;
&lt;br /&gt;
 ''1. Choosing the cryptography algorithm for data block'' '''i'''&lt;br /&gt;
 '''f [ i ] = rand ( Oracle )'''&lt;br /&gt;
&lt;br /&gt;
 ''2. Applying cryptography to data block'' '''i'''&lt;br /&gt;
 '''Cipher ( D [ i ] ) = f [ i ] ( D [ i ] )'''&lt;br /&gt;
&lt;br /&gt;
==Statistical resistance==&lt;br /&gt;
&lt;br /&gt;
Extensive testing has been performed on the statistical resistance properties of the CSPRNG and multi-cryptography modules, using the ENT, NIST and DIEHARD test suites. Provided results are taken from 64KB, 128KB, ... 256MB samples:&lt;br /&gt;
* [[Entropy (information theory)|bit entropy]] test: &amp;gt;7.9999xx / 8.000000&lt;br /&gt;
* [[Data compression|compression]] test: 0% size reduction after compression&lt;br /&gt;
* [[Pearson's chi-squared test|chi square distribution]] test: 40% &amp;lt; deviation &amp;lt; 60%&lt;br /&gt;
* [[mean value]] test: 127.4x / 127.5&lt;br /&gt;
* [[Monte Carlo method|Monte Carlo]] test: error &amp;lt; 0.01%&lt;br /&gt;
* [[Autocorrelation|serial correlation]] test: &amp;lt; 0.0001&lt;br /&gt;
&lt;br /&gt;
==Steganalysis resistance==&lt;br /&gt;
&lt;br /&gt;
Security, performance and [[Steganalysis|steganalysis resistance]] are conflicting trade-offs.&lt;br /&gt;
&lt;br /&gt;
[Security vs. Performance]: Whitening&lt;br /&gt;
* Pro: ensures higher data security&lt;br /&gt;
* Pro: allows deniable steganography&lt;br /&gt;
* '''Con1''': ''requires a lot of extra carrier bits''&lt;br /&gt;
&lt;br /&gt;
[Security vs. Steganalysis]: Cryptography + Whitening&lt;br /&gt;
* Pro: ensure higher data security&lt;br /&gt;
* '''Con2''': ''their [[Pseudorandom number generator|random]] statistical response marks carriers as more &amp;quot;suspicious&amp;quot;''&lt;br /&gt;
&lt;br /&gt;
Data, before carrier injection, is encrypted and whitened: a small amount of hidden data turns into a big chunk of pseudorandom &amp;quot;suspicious data&amp;quot;. Carrier injection encodes it using a non linear covering function that takes also original carrier bits as input. Modified carriers will need much less change ('''Con1''') and, lowering their random-like statistical response, deceive many steganalysis tests ('''Con2''').&lt;br /&gt;
&lt;br /&gt;
==Deniable steganography==&lt;br /&gt;
 &lt;br /&gt;
There will always be a non-negligible probability of being detected, even if the hidden stream behaves like a “natural container” (unpredictable side-effects, being caught in [[Flagrante delicto]], etc.). Resisting these unpredictable attacks is also possible, even when the user is forced (by legal or physical coercion) to provide a valid password. Deniable steganography (a decoy-based technique) allows the user to deny convincingly the fact that sensitive data is being hidden. The user needs to provide some expendable decoy data that he would [[Plausible deniability|plausibly]] want to keep confidential and reveal it to the attacker, claiming that this is all there is.&lt;br /&gt;
&lt;br /&gt;
== See also ==&lt;br /&gt;
* [[Steganography tools]]&lt;br /&gt;
&lt;br /&gt;
==Source==&lt;br /&gt;
&lt;br /&gt;
[http://wikipedia.org/ http://wikipedia.org/]&lt;br /&gt;
&lt;br /&gt;
[[Category:Cryptography]]&lt;br /&gt;
[[Category:Software]]&lt;/div&gt;</summary>
		<author><name>Admin</name></author>
		
	</entry>
</feed>