Richard Young Claude commited on
Commit
c8c4e95
·
1 Parent(s): 4a04000

Restore personal elements: Tupac image and Jeff Young memorial

Browse files

- Restored Tupac image at top of README
- Restored full memorial section for Jeff Young
- Kept comprehensive documentation and technical details
- Merged personal tribute with professional documentation

🤖 Generated with [Claude Code](https://claude.com/claude-code)

Co-Authored-By: Claude <noreply@anthropic.com>

Files changed (1) hide show
  1. README.md +96 -114
README.md CHANGED
@@ -16,12 +16,24 @@ tags:
16
  - cryptography
17
  ---
18
 
 
 
 
 
19
  # 🔫 2PAC: Picture Analyzer & Corruption Killer
20
 
21
  **Advanced image security, steganography, and forensic analysis toolkit**
22
 
 
 
23
  Hide secret messages in plain sight, detect hidden data in suspicious images, and validate image integrity—all in one powerful, easy-to-use interface.
24
 
 
 
 
 
 
 
25
  ---
26
 
27
  ## 🎯 What Can You Do?
@@ -48,10 +60,10 @@ Invisibly embed text messages inside images using military-grade LSB (Least Sign
48
  Advanced steganography detection powered by **RAT Finder** forensic technology:
49
 
50
  #### Detection Methods:
51
- - **🎨 ELA (Error Level Analysis)**: Highlights compression artifacts and manipulated regions by analyzing JPEG recompression patterns
52
  - **📊 LSB Pattern Analysis**: Detects non-random patterns in least significant bits using chi-square tests
53
- - **📈 Histogram Forensics**: Identifies statistical anomalies in color distribution typical of data hiding
54
- - **📝 Metadata Inspection**: Examines EXIF/XMP data for steganography tools or suspicious editing software
55
  - **📁 File Structure Analysis**: Checks for trailing data after image EOF markers
56
  - **🔬 Visual Noise Analysis**: Detects abnormal channel-specific noise patterns
57
 
@@ -105,11 +117,7 @@ The tool exploits a fundamental property of digital images: **the human eye cann
105
  These last bits can be modified!
106
  ```
107
 
108
- 2. **Data Encoding**: Your text is encrypted (if password provided), then converted to binary and embedded:
109
- ```
110
- Message "HI" → ASCII → Binary: 01001000 01001001
111
- Embed into LSBs of 8 pixels (1 bit per channel = 24 bits total)
112
- ```
113
 
114
  3. **Checksum Protection**: MD5 hash ensures data integrity during extraction
115
 
@@ -129,81 +137,54 @@ The tool exploits a fundamental property of digital images: **the human eye cann
129
 
130
  #### 1. **Error Level Analysis (ELA)**
131
  Re-compresses JPEG images at a known quality level and computes pixel-wise differences:
132
-
133
- - **Natural images**: Uniform error levels across the image
134
- - **Manipulated areas**: Different error levels (show as bright spots)
135
- - **Hidden data**: Can alter compression behavior detectably
136
 
137
  #### 2. **LSB Statistical Analysis**
138
  Performs chi-square tests on bit distributions:
139
-
140
- - **Natural images**: LSBs are pseudo-random but follow expected distributions
141
- - **Embedded data**: LSBs become statistically "too random" or show patterns
142
 
143
  #### 3. **Histogram Analysis**
144
  Analyzes color frequency distributions:
145
-
146
- - **Natural images**: Smooth, continuous color gradients
147
- - **Steganography**: Introduces micro-patterns and color pair artifacts
148
-
149
- #### 4. **Metadata Forensics**
150
- Checks EXIF/XMP fields for:
151
- - Software signatures (e.g., "Steghide", "OpenStego")
152
- - Unusual modification timestamps
153
- - Missing expected metadata for camera models
154
 
155
  ---
156
 
157
- ## 📖 Usage Guide
158
 
159
  ### 🔒 Hiding Data
160
 
161
- **Step 1**: Upload a PNG image (JPEG works but won't survive re-saving)
162
-
163
- **Step 2**: Enter your secret message
164
-
165
- **Step 3**: (Optional) Set a strong password for encryption
166
-
167
- **Step 4**: Choose LSB depth:
168
- - **1 bit** = Undetectable by casual analysis (best for security)
169
- - **2 bits** = Good balance of capacity and stealth
170
- - **3-4 bits** = Maximum capacity but may be detectable
171
-
172
- **Step 5**: Download the output PNG
173
 
174
  ⚠️ **Critical**: Never edit, crop, or re-save the output image (except as PNG)!
175
 
176
- ---
177
-
178
  ### 🔍 Detecting Hidden Data
179
 
180
- **Detection Tab**:
181
  1. Upload suspicious image
182
  2. Adjust sensitivity (higher = more thorough but more false positives)
183
  3. Review confidence score and analysis breakdown
184
  4. Check ELA visualization (bright = suspicious)
185
 
186
  **Confidence Interpretation**:
187
- - **70-100%** = High suspicion (multiple methods agree)
188
- - **40-69%** = Moderate (some anomalies detected)
189
- - **0-39%** = Low (likely clean or well-hidden)
190
-
191
- **Extraction Tab** (if you know it uses LSB steganography):
192
- 1. Upload image
193
- 2. Enter password (if encrypted)
194
- 3. Try different LSB depths (1-4) if unsure
195
- 4. Copy recovered message from code block
196
-
197
- ---
198
 
199
  ### 🛡️ Checking Corruption
200
 
201
  1. Upload image to validate
202
  2. Enable "Visual Corruption Check" for damaged photos
203
- 3. Adjust sensitivity:
204
- - **Low**: Only obvious corruption
205
- - **Medium**: Balanced (recommended)
206
- - **High**: Strict validation (may flag artistic images)
207
  4. Review diagnostic results
208
 
209
  ---
@@ -223,67 +204,24 @@ Checks EXIF/XMP fields for:
223
 
224
  ---
225
 
226
- ## 🎓 Educational Resources
227
-
228
- ### Learn More About Steganography:
229
- - [Wikipedia: Steganography](https://en.wikipedia.org/wiki/Steganography)
230
- - [LSB Technique Explained](https://www.sciencedirect.com/topics/computer-science/least-significant-bit)
231
- - [Digital Forensics: Steganalysis](https://www.forensicfocus.com/articles/an-overview-of-steganography/)
232
-
233
- ### Research Papers:
234
- - Johnson & Jajodia (1998): "Exploring Steganography: Seeing the Unseen"
235
- - Provos & Honeyman (2003): "Hide and Seek: An Introduction to Steganography"
236
- - Fridrich (2009): "Steganography in Digital Media"
237
-
238
- ---
239
-
240
- ## 🛠️ Technical Specifications
241
-
242
- **Supported Formats**:
243
- - **Input**: JPEG, PNG, GIF, BMP, TIFF, WebP, HEIC, AVIF
244
- - **Output (Hiding)**: PNG only (lossless requirement)
245
-
246
- **Steganography Algorithm**:
247
- - Method: LSB replacement
248
- - Channels: RGB (3 bytes per pixel)
249
- - Bit depth: 1-4 configurable
250
- - Encryption: XOR cipher with SHA-256 key derivation
251
- - Integrity: MD5 checksum (8 bytes)
252
-
253
- **Detection Algorithms**:
254
- - ELA (Error Level Analysis)
255
- - Chi-square test for LSB randomness
256
- - Histogram pair analysis
257
- - EXIF metadata inspection
258
- - File structure validation
259
- - Visual noise coefficient analysis
260
-
261
- **Performance**:
262
- - Images resized to max 1000×1000 for analysis (speed optimization)
263
- - Processing time: 1-5 seconds for typical images
264
- - Maximum recommended image size: 10 megapixels
265
-
266
- ---
267
-
268
  ## 💡 Pro Tips
269
 
270
  ### For Maximum Stealth:
271
  1. Use 1-bit LSB depth (hardest to detect)
272
  2. Start with high-resolution images (more bits to work with)
273
  3. Use password encryption (adds randomness)
274
- 4. Share via platforms that don't re-compress (e.g., file sharing, not social media)
275
- 5. Embed in photos with complex scenes (harder to analyze than solid colors)
276
 
277
  ### For Maximum Capacity:
278
  1. Use 4-bit LSB depth (8× more capacity than 1-bit)
279
  2. Large images (4K photos can hide megabytes)
280
  3. Compress your message before embedding
281
- 4. Use PNG-8 images (256 colors) for smaller file sizes
282
 
283
  ### For Detection:
284
- 1. Always check ELA visualization first (quickest indicator)
285
  2. Run multiple sensitivity levels
286
- 3. Compare with known clean versions of the image
287
  4. Check metadata for software signatures
288
  5. Try extraction even with low confidence scores
289
 
@@ -318,14 +256,47 @@ Scenario: Suspect image seized in investigation
318
  4. Examine metadata for tool signatures
319
  ```
320
 
321
- ### Example 4: CTF Competition
322
- ```
323
- Scenario: Capture The Flag challenge
324
- 1. Detect hidden flag in challenge image
325
- 2. Use LSB analysis to identify bit depth
326
- 3. Extract flag with correct parameters
327
- 4. Submit for points
328
- ```
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
329
 
330
  ---
331
 
@@ -362,6 +333,18 @@ Part of the **DeepNeuro.AI** research toolkit
362
 
363
  ---
364
 
 
 
 
 
 
 
 
 
 
 
 
 
365
  ## 📜 License
366
 
367
  MIT License - Free for educational, research, and commercial use
@@ -395,9 +378,8 @@ Found a bug? Have a feature request?
395
 
396
  *Hide it. Find it. Verify it.*
397
 
398
- [![GitHub](https://img.shields.io/badge/GitHub-2PAC-blue?logo=github)](https://github.com/ricyoung/2pac)
399
- [![License](https://img.shields.io/badge/License-MIT-green.svg)](https://opensource.org/licenses/MIT)
400
- [![Gradio](https://img.shields.io/badge/Gradio-5.49.1-orange.svg)](https://gradio.app)
401
- [![HF Space](https://img.shields.io/badge/🤗-Hugging%20Face%20Space-yellow)](https://huggingface.co/spaces/richardyoung/2pac)
402
 
403
  </div>
 
16
  - cryptography
17
  ---
18
 
19
+ <div align="center">
20
+
21
+ <img src="docs/2pac.jpg" alt="2PAC Coding" width="400">
22
+
23
  # 🔫 2PAC: Picture Analyzer & Corruption Killer
24
 
25
  **Advanced image security, steganography, and forensic analysis toolkit**
26
 
27
+ *"All Eyez On Your Images" 👁️*
28
+
29
  Hide secret messages in plain sight, detect hidden data in suspicious images, and validate image integrity—all in one powerful, easy-to-use interface.
30
 
31
+ [![GitHub](https://img.shields.io/badge/GitHub-2PAC-blue?logo=github)](https://github.com/ricyoung/2pac)
32
+ [![License](https://img.shields.io/badge/License-MIT-green.svg)](https://opensource.org/licenses/MIT)
33
+ [![Gradio](https://img.shields.io/badge/Gradio-5.49.1-orange.svg)](https://gradio.app)
34
+
35
+ </div>
36
+
37
  ---
38
 
39
  ## 🎯 What Can You Do?
 
60
  Advanced steganography detection powered by **RAT Finder** forensic technology:
61
 
62
  #### Detection Methods:
63
+ - **🎨 ELA (Error Level Analysis)**: Highlights compression artifacts and manipulated regions
64
  - **📊 LSB Pattern Analysis**: Detects non-random patterns in least significant bits using chi-square tests
65
+ - **📈 Histogram Forensics**: Identifies statistical anomalies in color distribution
66
+ - **📝 Metadata Inspection**: Examines EXIF/XMP data for steganography tools
67
  - **📁 File Structure Analysis**: Checks for trailing data after image EOF markers
68
  - **🔬 Visual Noise Analysis**: Detects abnormal channel-specific noise patterns
69
 
 
117
  These last bits can be modified!
118
  ```
119
 
120
+ 2. **Data Encoding**: Your text is encrypted (if password provided), then converted to binary and embedded
 
 
 
 
121
 
122
  3. **Checksum Protection**: MD5 hash ensures data integrity during extraction
123
 
 
137
 
138
  #### 1. **Error Level Analysis (ELA)**
139
  Re-compresses JPEG images at a known quality level and computes pixel-wise differences:
140
+ - Natural images: Uniform error levels
141
+ - Manipulated areas: Different error levels (bright spots)
142
+ - Hidden data: Can alter compression behavior detectably
 
143
 
144
  #### 2. **LSB Statistical Analysis**
145
  Performs chi-square tests on bit distributions:
146
+ - Natural images: LSBs follow expected distributions
147
+ - Embedded data: LSBs become statistically "too random"
 
148
 
149
  #### 3. **Histogram Analysis**
150
  Analyzes color frequency distributions:
151
+ - Natural images: Smooth, continuous gradients
152
+ - Steganography: Introduces micro-patterns and color pair artifacts
 
 
 
 
 
 
 
153
 
154
  ---
155
 
156
+ ## 📖 Quick Start Guide
157
 
158
  ### 🔒 Hiding Data
159
 
160
+ 1. Upload a PNG image (JPEG works but won't survive re-saving)
161
+ 2. Enter your secret message
162
+ 3. (Optional) Set a strong password for encryption
163
+ 4. Choose LSB depth:
164
+ - **1 bit** = Undetectable (best for security)
165
+ - **2 bits** = Good balance
166
+ - **3-4 bits** = Maximum capacity
167
+ 5. Download the output PNG
 
 
 
 
168
 
169
  ⚠️ **Critical**: Never edit, crop, or re-save the output image (except as PNG)!
170
 
 
 
171
  ### 🔍 Detecting Hidden Data
172
 
 
173
  1. Upload suspicious image
174
  2. Adjust sensitivity (higher = more thorough but more false positives)
175
  3. Review confidence score and analysis breakdown
176
  4. Check ELA visualization (bright = suspicious)
177
 
178
  **Confidence Interpretation**:
179
+ - **70-100%** = High suspicion
180
+ - **40-69%** = Moderate
181
+ - **0-39%** = Low (likely clean)
 
 
 
 
 
 
 
 
182
 
183
  ### 🛡️ Checking Corruption
184
 
185
  1. Upload image to validate
186
  2. Enable "Visual Corruption Check" for damaged photos
187
+ 3. Adjust sensitivity (Low/Medium/High)
 
 
 
188
  4. Review diagnostic results
189
 
190
  ---
 
204
 
205
  ---
206
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
207
  ## 💡 Pro Tips
208
 
209
  ### For Maximum Stealth:
210
  1. Use 1-bit LSB depth (hardest to detect)
211
  2. Start with high-resolution images (more bits to work with)
212
  3. Use password encryption (adds randomness)
213
+ 4. Share via platforms that don't re-compress
214
+ 5. Embed in photos with complex scenes (harder to analyze)
215
 
216
  ### For Maximum Capacity:
217
  1. Use 4-bit LSB depth (8× more capacity than 1-bit)
218
  2. Large images (4K photos can hide megabytes)
219
  3. Compress your message before embedding
 
220
 
221
  ### For Detection:
222
+ 1. Always check ELA visualization first
223
  2. Run multiple sensitivity levels
224
+ 3. Compare with known clean versions
225
  4. Check metadata for software signatures
226
  5. Try extraction even with low confidence scores
227
 
 
256
  4. Examine metadata for tool signatures
257
  ```
258
 
259
+ ---
260
+
261
+ ## 🛠️ Technical Specifications
262
+
263
+ **Supported Formats**:
264
+ - **Input**: JPEG, PNG, GIF, BMP, TIFF, WebP, HEIC, AVIF
265
+ - **Output (Hiding)**: PNG only (lossless requirement)
266
+
267
+ **Steganography Algorithm**:
268
+ - Method: LSB replacement
269
+ - Channels: RGB (3 bytes per pixel)
270
+ - Bit depth: 1-4 configurable
271
+ - Encryption: XOR cipher with SHA-256 key derivation
272
+ - Integrity: MD5 checksum (8 bytes)
273
+
274
+ **Detection Algorithms**:
275
+ - ELA (Error Level Analysis)
276
+ - Chi-square test for LSB randomness
277
+ - Histogram pair analysis
278
+ - EXIF metadata inspection
279
+ - File structure validation
280
+ - Visual noise coefficient analysis
281
+
282
+ **Performance**:
283
+ - Images resized to max 1000×1000 for analysis
284
+ - Processing time: 1-5 seconds for typical images
285
+ - Maximum recommended image size: 10 megapixels
286
+
287
+ ---
288
+
289
+ ## 🎓 Educational Resources
290
+
291
+ ### Learn More About Steganography:
292
+ - [Wikipedia: Steganography](https://en.wikipedia.org/wiki/Steganography)
293
+ - [LSB Technique Explained](https://www.sciencedirect.com/topics/computer-science/least-significant-bit)
294
+ - [Digital Forensics: Steganalysis](https://www.forensicfocus.com/articles/an-overview-of-steganography/)
295
+
296
+ ### Research Papers:
297
+ - Johnson & Jajodia (1998): "Exploring Steganography: Seeing the Unseen"
298
+ - Provos & Honeyman (2003): "Hide and Seek: An Introduction to Steganography"
299
+ - Fridrich (2009): "Steganography in Digital Media"
300
 
301
  ---
302
 
 
333
 
334
  ---
335
 
336
+ ## 🕊️ In Memory of Jeff Young
337
+
338
+ <div align="center">
339
+ <img src="docs/jeff.jpg" alt="Jeff Young" width="400">
340
+ </div>
341
+
342
+ This project is dedicated to the memory of **Jeff Young**, who loved Tupac's music and embodied his spirit of bringing people together. Like my brother, Jeff would always reach out to help others, making connections and building community wherever he went. His compassion for people and willingness to always lend a hand to those in need are qualities that inspired this tool's purpose—helping others preserve their precious memories.
343
+
344
+ May your photos always be as bright and clear as the memories they capture, and may we all strive to connect and help others as Jeff did.
345
+
346
+ ---
347
+
348
  ## 📜 License
349
 
350
  MIT License - Free for educational, research, and commercial use
 
378
 
379
  *Hide it. Find it. Verify it.*
380
 
381
+ *"I ain't a killer but don't push me. Corrupt images got their days numbered."*
382
+
383
+ Made with ❤️ by [Richard Young](https://github.com/ricyoung)
 
384
 
385
  </div>