Dimi wrote:
There might be a file (picture) downloaded with a zip file with cp files inside.
Sure, there might be...there might be a lot of things.
What data do you have that points to a downloaded image file with a zipped archive of images stego'd inside it?
In the DF field, we can really caught up in the "maybes" and "what ifs", to the point where we never actually finish anything.
Look at it this way...*if* a suspect downloaded an image file that has a zipped archive of images stego'd inside it, they would then need an application to access/retrieve the stego'd file, right? Otherwise, how would they access it?
Yes, opening a JPG file for viewing is easy. Opening a zipped archive is easy. But retrieving a zipped archive that is stego'd inside a JPG file is not, and requires a specialized application, one specific to the method of steganography used.
Also, something of a side thought...for an image file to have a zipped archive of images stego'd inside it, it's gonna have to be HUGE. (I know you just said the word "HUGE" in your best Donald Trump voice...)
↧