Spaces:
Sleeping
Sleeping
Richard Young
Claude
commited on
Commit
·
c8c4e95
1
Parent(s):
4a04000
Restore personal elements: Tupac image and Jeff Young memorial
Browse files- Restored Tupac image at top of README
- Restored full memorial section for Jeff Young
- Kept comprehensive documentation and technical details
- Merged personal tribute with professional documentation
🤖 Generated with [Claude Code](https://claude.com/claude-code)
Co-Authored-By: Claude <noreply@anthropic.com>
README.md
CHANGED
|
@@ -16,12 +16,24 @@ tags:
|
|
| 16 |
- cryptography
|
| 17 |
---
|
| 18 |
|
|
|
|
|
|
|
|
|
|
|
|
|
| 19 |
# 🔫 2PAC: Picture Analyzer & Corruption Killer
|
| 20 |
|
| 21 |
**Advanced image security, steganography, and forensic analysis toolkit**
|
| 22 |
|
|
|
|
|
|
|
| 23 |
Hide secret messages in plain sight, detect hidden data in suspicious images, and validate image integrity—all in one powerful, easy-to-use interface.
|
| 24 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 25 |
---
|
| 26 |
|
| 27 |
## 🎯 What Can You Do?
|
|
@@ -48,10 +60,10 @@ Invisibly embed text messages inside images using military-grade LSB (Least Sign
|
|
| 48 |
Advanced steganography detection powered by **RAT Finder** forensic technology:
|
| 49 |
|
| 50 |
#### Detection Methods:
|
| 51 |
-
- **🎨 ELA (Error Level Analysis)**: Highlights compression artifacts and manipulated regions
|
| 52 |
- **📊 LSB Pattern Analysis**: Detects non-random patterns in least significant bits using chi-square tests
|
| 53 |
-
- **📈 Histogram Forensics**: Identifies statistical anomalies in color distribution
|
| 54 |
-
- **📝 Metadata Inspection**: Examines EXIF/XMP data for steganography tools
|
| 55 |
- **📁 File Structure Analysis**: Checks for trailing data after image EOF markers
|
| 56 |
- **🔬 Visual Noise Analysis**: Detects abnormal channel-specific noise patterns
|
| 57 |
|
|
@@ -105,11 +117,7 @@ The tool exploits a fundamental property of digital images: **the human eye cann
|
|
| 105 |
These last bits can be modified!
|
| 106 |
```
|
| 107 |
|
| 108 |
-
2. **Data Encoding**: Your text is encrypted (if password provided), then converted to binary and embedded
|
| 109 |
-
```
|
| 110 |
-
Message "HI" → ASCII → Binary: 01001000 01001001
|
| 111 |
-
Embed into LSBs of 8 pixels (1 bit per channel = 24 bits total)
|
| 112 |
-
```
|
| 113 |
|
| 114 |
3. **Checksum Protection**: MD5 hash ensures data integrity during extraction
|
| 115 |
|
|
@@ -129,81 +137,54 @@ The tool exploits a fundamental property of digital images: **the human eye cann
|
|
| 129 |
|
| 130 |
#### 1. **Error Level Analysis (ELA)**
|
| 131 |
Re-compresses JPEG images at a known quality level and computes pixel-wise differences:
|
| 132 |
-
|
| 133 |
-
-
|
| 134 |
-
-
|
| 135 |
-
- **Hidden data**: Can alter compression behavior detectably
|
| 136 |
|
| 137 |
#### 2. **LSB Statistical Analysis**
|
| 138 |
Performs chi-square tests on bit distributions:
|
| 139 |
-
|
| 140 |
-
-
|
| 141 |
-
- **Embedded data**: LSBs become statistically "too random" or show patterns
|
| 142 |
|
| 143 |
#### 3. **Histogram Analysis**
|
| 144 |
Analyzes color frequency distributions:
|
| 145 |
-
|
| 146 |
-
-
|
| 147 |
-
- **Steganography**: Introduces micro-patterns and color pair artifacts
|
| 148 |
-
|
| 149 |
-
#### 4. **Metadata Forensics**
|
| 150 |
-
Checks EXIF/XMP fields for:
|
| 151 |
-
- Software signatures (e.g., "Steghide", "OpenStego")
|
| 152 |
-
- Unusual modification timestamps
|
| 153 |
-
- Missing expected metadata for camera models
|
| 154 |
|
| 155 |
---
|
| 156 |
|
| 157 |
-
## 📖
|
| 158 |
|
| 159 |
### 🔒 Hiding Data
|
| 160 |
|
| 161 |
-
|
| 162 |
-
|
| 163 |
-
|
| 164 |
-
|
| 165 |
-
**
|
| 166 |
-
|
| 167 |
-
**
|
| 168 |
-
|
| 169 |
-
- **2 bits** = Good balance of capacity and stealth
|
| 170 |
-
- **3-4 bits** = Maximum capacity but may be detectable
|
| 171 |
-
|
| 172 |
-
**Step 5**: Download the output PNG
|
| 173 |
|
| 174 |
⚠️ **Critical**: Never edit, crop, or re-save the output image (except as PNG)!
|
| 175 |
|
| 176 |
-
---
|
| 177 |
-
|
| 178 |
### 🔍 Detecting Hidden Data
|
| 179 |
|
| 180 |
-
**Detection Tab**:
|
| 181 |
1. Upload suspicious image
|
| 182 |
2. Adjust sensitivity (higher = more thorough but more false positives)
|
| 183 |
3. Review confidence score and analysis breakdown
|
| 184 |
4. Check ELA visualization (bright = suspicious)
|
| 185 |
|
| 186 |
**Confidence Interpretation**:
|
| 187 |
-
- **70-100%** = High suspicion
|
| 188 |
-
- **40-69%** = Moderate
|
| 189 |
-
- **0-39%** = Low (likely clean
|
| 190 |
-
|
| 191 |
-
**Extraction Tab** (if you know it uses LSB steganography):
|
| 192 |
-
1. Upload image
|
| 193 |
-
2. Enter password (if encrypted)
|
| 194 |
-
3. Try different LSB depths (1-4) if unsure
|
| 195 |
-
4. Copy recovered message from code block
|
| 196 |
-
|
| 197 |
-
---
|
| 198 |
|
| 199 |
### 🛡️ Checking Corruption
|
| 200 |
|
| 201 |
1. Upload image to validate
|
| 202 |
2. Enable "Visual Corruption Check" for damaged photos
|
| 203 |
-
3. Adjust sensitivity
|
| 204 |
-
- **Low**: Only obvious corruption
|
| 205 |
-
- **Medium**: Balanced (recommended)
|
| 206 |
-
- **High**: Strict validation (may flag artistic images)
|
| 207 |
4. Review diagnostic results
|
| 208 |
|
| 209 |
---
|
|
@@ -223,67 +204,24 @@ Checks EXIF/XMP fields for:
|
|
| 223 |
|
| 224 |
---
|
| 225 |
|
| 226 |
-
## 🎓 Educational Resources
|
| 227 |
-
|
| 228 |
-
### Learn More About Steganography:
|
| 229 |
-
- [Wikipedia: Steganography](https://en.wikipedia.org/wiki/Steganography)
|
| 230 |
-
- [LSB Technique Explained](https://www.sciencedirect.com/topics/computer-science/least-significant-bit)
|
| 231 |
-
- [Digital Forensics: Steganalysis](https://www.forensicfocus.com/articles/an-overview-of-steganography/)
|
| 232 |
-
|
| 233 |
-
### Research Papers:
|
| 234 |
-
- Johnson & Jajodia (1998): "Exploring Steganography: Seeing the Unseen"
|
| 235 |
-
- Provos & Honeyman (2003): "Hide and Seek: An Introduction to Steganography"
|
| 236 |
-
- Fridrich (2009): "Steganography in Digital Media"
|
| 237 |
-
|
| 238 |
-
---
|
| 239 |
-
|
| 240 |
-
## 🛠️ Technical Specifications
|
| 241 |
-
|
| 242 |
-
**Supported Formats**:
|
| 243 |
-
- **Input**: JPEG, PNG, GIF, BMP, TIFF, WebP, HEIC, AVIF
|
| 244 |
-
- **Output (Hiding)**: PNG only (lossless requirement)
|
| 245 |
-
|
| 246 |
-
**Steganography Algorithm**:
|
| 247 |
-
- Method: LSB replacement
|
| 248 |
-
- Channels: RGB (3 bytes per pixel)
|
| 249 |
-
- Bit depth: 1-4 configurable
|
| 250 |
-
- Encryption: XOR cipher with SHA-256 key derivation
|
| 251 |
-
- Integrity: MD5 checksum (8 bytes)
|
| 252 |
-
|
| 253 |
-
**Detection Algorithms**:
|
| 254 |
-
- ELA (Error Level Analysis)
|
| 255 |
-
- Chi-square test for LSB randomness
|
| 256 |
-
- Histogram pair analysis
|
| 257 |
-
- EXIF metadata inspection
|
| 258 |
-
- File structure validation
|
| 259 |
-
- Visual noise coefficient analysis
|
| 260 |
-
|
| 261 |
-
**Performance**:
|
| 262 |
-
- Images resized to max 1000×1000 for analysis (speed optimization)
|
| 263 |
-
- Processing time: 1-5 seconds for typical images
|
| 264 |
-
- Maximum recommended image size: 10 megapixels
|
| 265 |
-
|
| 266 |
-
---
|
| 267 |
-
|
| 268 |
## 💡 Pro Tips
|
| 269 |
|
| 270 |
### For Maximum Stealth:
|
| 271 |
1. Use 1-bit LSB depth (hardest to detect)
|
| 272 |
2. Start with high-resolution images (more bits to work with)
|
| 273 |
3. Use password encryption (adds randomness)
|
| 274 |
-
4. Share via platforms that don't re-compress
|
| 275 |
-
5. Embed in photos with complex scenes (harder to analyze
|
| 276 |
|
| 277 |
### For Maximum Capacity:
|
| 278 |
1. Use 4-bit LSB depth (8× more capacity than 1-bit)
|
| 279 |
2. Large images (4K photos can hide megabytes)
|
| 280 |
3. Compress your message before embedding
|
| 281 |
-
4. Use PNG-8 images (256 colors) for smaller file sizes
|
| 282 |
|
| 283 |
### For Detection:
|
| 284 |
-
1. Always check ELA visualization first
|
| 285 |
2. Run multiple sensitivity levels
|
| 286 |
-
3. Compare with known clean versions
|
| 287 |
4. Check metadata for software signatures
|
| 288 |
5. Try extraction even with low confidence scores
|
| 289 |
|
|
@@ -318,14 +256,47 @@ Scenario: Suspect image seized in investigation
|
|
| 318 |
4. Examine metadata for tool signatures
|
| 319 |
```
|
| 320 |
|
| 321 |
-
|
| 322 |
-
|
| 323 |
-
|
| 324 |
-
|
| 325 |
-
|
| 326 |
-
|
| 327 |
-
|
| 328 |
-
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 329 |
|
| 330 |
---
|
| 331 |
|
|
@@ -362,6 +333,18 @@ Part of the **DeepNeuro.AI** research toolkit
|
|
| 362 |
|
| 363 |
---
|
| 364 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 365 |
## 📜 License
|
| 366 |
|
| 367 |
MIT License - Free for educational, research, and commercial use
|
|
@@ -395,9 +378,8 @@ Found a bug? Have a feature request?
|
|
| 395 |
|
| 396 |
*Hide it. Find it. Verify it.*
|
| 397 |
|
| 398 |
-
|
| 399 |
-
|
| 400 |
-
[
|
| 401 |
-
[](https://huggingface.co/spaces/richardyoung/2pac)
|
| 402 |
|
| 403 |
</div>
|
|
|
|
| 16 |
- cryptography
|
| 17 |
---
|
| 18 |
|
| 19 |
+
<div align="center">
|
| 20 |
+
|
| 21 |
+
<img src="docs/2pac.jpg" alt="2PAC Coding" width="400">
|
| 22 |
+
|
| 23 |
# 🔫 2PAC: Picture Analyzer & Corruption Killer
|
| 24 |
|
| 25 |
**Advanced image security, steganography, and forensic analysis toolkit**
|
| 26 |
|
| 27 |
+
*"All Eyez On Your Images" 👁️*
|
| 28 |
+
|
| 29 |
Hide secret messages in plain sight, detect hidden data in suspicious images, and validate image integrity—all in one powerful, easy-to-use interface.
|
| 30 |
|
| 31 |
+
[](https://github.com/ricyoung/2pac)
|
| 32 |
+
[](https://opensource.org/licenses/MIT)
|
| 33 |
+
[](https://gradio.app)
|
| 34 |
+
|
| 35 |
+
</div>
|
| 36 |
+
|
| 37 |
---
|
| 38 |
|
| 39 |
## 🎯 What Can You Do?
|
|
|
|
| 60 |
Advanced steganography detection powered by **RAT Finder** forensic technology:
|
| 61 |
|
| 62 |
#### Detection Methods:
|
| 63 |
+
- **🎨 ELA (Error Level Analysis)**: Highlights compression artifacts and manipulated regions
|
| 64 |
- **📊 LSB Pattern Analysis**: Detects non-random patterns in least significant bits using chi-square tests
|
| 65 |
+
- **📈 Histogram Forensics**: Identifies statistical anomalies in color distribution
|
| 66 |
+
- **📝 Metadata Inspection**: Examines EXIF/XMP data for steganography tools
|
| 67 |
- **📁 File Structure Analysis**: Checks for trailing data after image EOF markers
|
| 68 |
- **🔬 Visual Noise Analysis**: Detects abnormal channel-specific noise patterns
|
| 69 |
|
|
|
|
| 117 |
These last bits can be modified!
|
| 118 |
```
|
| 119 |
|
| 120 |
+
2. **Data Encoding**: Your text is encrypted (if password provided), then converted to binary and embedded
|
|
|
|
|
|
|
|
|
|
|
|
|
| 121 |
|
| 122 |
3. **Checksum Protection**: MD5 hash ensures data integrity during extraction
|
| 123 |
|
|
|
|
| 137 |
|
| 138 |
#### 1. **Error Level Analysis (ELA)**
|
| 139 |
Re-compresses JPEG images at a known quality level and computes pixel-wise differences:
|
| 140 |
+
- Natural images: Uniform error levels
|
| 141 |
+
- Manipulated areas: Different error levels (bright spots)
|
| 142 |
+
- Hidden data: Can alter compression behavior detectably
|
|
|
|
| 143 |
|
| 144 |
#### 2. **LSB Statistical Analysis**
|
| 145 |
Performs chi-square tests on bit distributions:
|
| 146 |
+
- Natural images: LSBs follow expected distributions
|
| 147 |
+
- Embedded data: LSBs become statistically "too random"
|
|
|
|
| 148 |
|
| 149 |
#### 3. **Histogram Analysis**
|
| 150 |
Analyzes color frequency distributions:
|
| 151 |
+
- Natural images: Smooth, continuous gradients
|
| 152 |
+
- Steganography: Introduces micro-patterns and color pair artifacts
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 153 |
|
| 154 |
---
|
| 155 |
|
| 156 |
+
## 📖 Quick Start Guide
|
| 157 |
|
| 158 |
### 🔒 Hiding Data
|
| 159 |
|
| 160 |
+
1. Upload a PNG image (JPEG works but won't survive re-saving)
|
| 161 |
+
2. Enter your secret message
|
| 162 |
+
3. (Optional) Set a strong password for encryption
|
| 163 |
+
4. Choose LSB depth:
|
| 164 |
+
- **1 bit** = Undetectable (best for security)
|
| 165 |
+
- **2 bits** = Good balance
|
| 166 |
+
- **3-4 bits** = Maximum capacity
|
| 167 |
+
5. Download the output PNG
|
|
|
|
|
|
|
|
|
|
|
|
|
| 168 |
|
| 169 |
⚠️ **Critical**: Never edit, crop, or re-save the output image (except as PNG)!
|
| 170 |
|
|
|
|
|
|
|
| 171 |
### 🔍 Detecting Hidden Data
|
| 172 |
|
|
|
|
| 173 |
1. Upload suspicious image
|
| 174 |
2. Adjust sensitivity (higher = more thorough but more false positives)
|
| 175 |
3. Review confidence score and analysis breakdown
|
| 176 |
4. Check ELA visualization (bright = suspicious)
|
| 177 |
|
| 178 |
**Confidence Interpretation**:
|
| 179 |
+
- **70-100%** = High suspicion
|
| 180 |
+
- **40-69%** = Moderate
|
| 181 |
+
- **0-39%** = Low (likely clean)
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 182 |
|
| 183 |
### 🛡️ Checking Corruption
|
| 184 |
|
| 185 |
1. Upload image to validate
|
| 186 |
2. Enable "Visual Corruption Check" for damaged photos
|
| 187 |
+
3. Adjust sensitivity (Low/Medium/High)
|
|
|
|
|
|
|
|
|
|
| 188 |
4. Review diagnostic results
|
| 189 |
|
| 190 |
---
|
|
|
|
| 204 |
|
| 205 |
---
|
| 206 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 207 |
## 💡 Pro Tips
|
| 208 |
|
| 209 |
### For Maximum Stealth:
|
| 210 |
1. Use 1-bit LSB depth (hardest to detect)
|
| 211 |
2. Start with high-resolution images (more bits to work with)
|
| 212 |
3. Use password encryption (adds randomness)
|
| 213 |
+
4. Share via platforms that don't re-compress
|
| 214 |
+
5. Embed in photos with complex scenes (harder to analyze)
|
| 215 |
|
| 216 |
### For Maximum Capacity:
|
| 217 |
1. Use 4-bit LSB depth (8× more capacity than 1-bit)
|
| 218 |
2. Large images (4K photos can hide megabytes)
|
| 219 |
3. Compress your message before embedding
|
|
|
|
| 220 |
|
| 221 |
### For Detection:
|
| 222 |
+
1. Always check ELA visualization first
|
| 223 |
2. Run multiple sensitivity levels
|
| 224 |
+
3. Compare with known clean versions
|
| 225 |
4. Check metadata for software signatures
|
| 226 |
5. Try extraction even with low confidence scores
|
| 227 |
|
|
|
|
| 256 |
4. Examine metadata for tool signatures
|
| 257 |
```
|
| 258 |
|
| 259 |
+
---
|
| 260 |
+
|
| 261 |
+
## 🛠️ Technical Specifications
|
| 262 |
+
|
| 263 |
+
**Supported Formats**:
|
| 264 |
+
- **Input**: JPEG, PNG, GIF, BMP, TIFF, WebP, HEIC, AVIF
|
| 265 |
+
- **Output (Hiding)**: PNG only (lossless requirement)
|
| 266 |
+
|
| 267 |
+
**Steganography Algorithm**:
|
| 268 |
+
- Method: LSB replacement
|
| 269 |
+
- Channels: RGB (3 bytes per pixel)
|
| 270 |
+
- Bit depth: 1-4 configurable
|
| 271 |
+
- Encryption: XOR cipher with SHA-256 key derivation
|
| 272 |
+
- Integrity: MD5 checksum (8 bytes)
|
| 273 |
+
|
| 274 |
+
**Detection Algorithms**:
|
| 275 |
+
- ELA (Error Level Analysis)
|
| 276 |
+
- Chi-square test for LSB randomness
|
| 277 |
+
- Histogram pair analysis
|
| 278 |
+
- EXIF metadata inspection
|
| 279 |
+
- File structure validation
|
| 280 |
+
- Visual noise coefficient analysis
|
| 281 |
+
|
| 282 |
+
**Performance**:
|
| 283 |
+
- Images resized to max 1000×1000 for analysis
|
| 284 |
+
- Processing time: 1-5 seconds for typical images
|
| 285 |
+
- Maximum recommended image size: 10 megapixels
|
| 286 |
+
|
| 287 |
+
---
|
| 288 |
+
|
| 289 |
+
## 🎓 Educational Resources
|
| 290 |
+
|
| 291 |
+
### Learn More About Steganography:
|
| 292 |
+
- [Wikipedia: Steganography](https://en.wikipedia.org/wiki/Steganography)
|
| 293 |
+
- [LSB Technique Explained](https://www.sciencedirect.com/topics/computer-science/least-significant-bit)
|
| 294 |
+
- [Digital Forensics: Steganalysis](https://www.forensicfocus.com/articles/an-overview-of-steganography/)
|
| 295 |
+
|
| 296 |
+
### Research Papers:
|
| 297 |
+
- Johnson & Jajodia (1998): "Exploring Steganography: Seeing the Unseen"
|
| 298 |
+
- Provos & Honeyman (2003): "Hide and Seek: An Introduction to Steganography"
|
| 299 |
+
- Fridrich (2009): "Steganography in Digital Media"
|
| 300 |
|
| 301 |
---
|
| 302 |
|
|
|
|
| 333 |
|
| 334 |
---
|
| 335 |
|
| 336 |
+
## 🕊️ In Memory of Jeff Young
|
| 337 |
+
|
| 338 |
+
<div align="center">
|
| 339 |
+
<img src="docs/jeff.jpg" alt="Jeff Young" width="400">
|
| 340 |
+
</div>
|
| 341 |
+
|
| 342 |
+
This project is dedicated to the memory of **Jeff Young**, who loved Tupac's music and embodied his spirit of bringing people together. Like my brother, Jeff would always reach out to help others, making connections and building community wherever he went. His compassion for people and willingness to always lend a hand to those in need are qualities that inspired this tool's purpose—helping others preserve their precious memories.
|
| 343 |
+
|
| 344 |
+
May your photos always be as bright and clear as the memories they capture, and may we all strive to connect and help others as Jeff did.
|
| 345 |
+
|
| 346 |
+
---
|
| 347 |
+
|
| 348 |
## 📜 License
|
| 349 |
|
| 350 |
MIT License - Free for educational, research, and commercial use
|
|
|
|
| 378 |
|
| 379 |
*Hide it. Find it. Verify it.*
|
| 380 |
|
| 381 |
+
*"I ain't a killer but don't push me. Corrupt images got their days numbered."*
|
| 382 |
+
|
| 383 |
+
Made with ❤️ by [Richard Young](https://github.com/ricyoung)
|
|
|
|
| 384 |
|
| 385 |
</div>
|