Make your own free website on Tripod.com

        T e r r o r i s t   W a t c h

 

While you walk through this life so precious hold the flame of God's love gently in the palm of your hand, for the wind is fickle.

                                                                                                                   
Terrorist Watch addresses the terrorist activities and the the methods used by al-Qaeda terrorist operatives in the U.S.,  with in-depth analysis of  the relationships that exist between al-Qaeda and Middle Eastern terrorist groups and their Middle East nation-state benefactors.

 

This Web site was first published in July of 1998, and has been  maintained and updated on a non-profit basis consistently since that time, without personal concern of retribution, despite a number of death threats, for the benefit of citizens worldwide who cherish their families, the right to live in a free and democratic society, and the freedom to worship the true God Almighty through the religion of their choice.

 

Terrorist Watch

    New Era Preface
    The Little Scroll
   America Strikes Back
    Preface to The Little Scroll
    The Little Scroll  Summary

    Iranian Ties to al-Qaeda

Kings and Generals of Nations

al Qaeda Description

The Walrus of the Sea

New Era Satellite View

State-Sponsored Terrorism

al Qaeda Terrorism In England

Terrorist Threat Confronting US

Usama bin Laden

    Ayman Al-Zawahiri FBI Poster

The Saudi Connection

    The USA Dollar Bill

The Al-Qai'da Manual Section 1

NORAD Security Breach

US Nuclear Missile Shield

Babylon of Usama bin Laden

Charter of Hamas

New Era OPS Members

Former al Qai'da Prophet

The Terrorist Threat Confronting the United States

Counter-Terrorism Sites

Afghan/Taliban/al-Qaeda Links

Interpol's Bin Laden Site 

Congressional Quarterly Press

ERRI Site on bin Laden/al Qai'da

Official DoD Pentagon Photos

FBI Official Website Most Wanted Terrorists

The U.S. Constitution

The US Bill of Rights

 

 

Need an Exceptional Web
Site that rates on the first
page of search engines?
        
              (Ours do)

   Contact the WebMaster

Buy Starbucks Here!
 
President Illuminated 20


President Illuminated 20" Globe

PalmPak Travel Card: Rand McNally Road Atlas


PalmPak Travel Card:

 Rand McNally Road Atlas

 

 
sedcash_120_60_static-copy.gif
 
 
 
 
 

 

 

 

mp3stego

When looking at the steganographic tools available on the Net, it occurred to me that nothing had been done to hide information in MP3 files, that is sound tracks compressed using the MPEG Audio Layer III format. There is a growing interest world-wide in MP3 files because they offer near-CD quality at compression ratio of 11 to 1 (128 kilobits per second). This gives a very good opportunity for information hiding.

MP3Stego will hide information in MP3 files during the compression process. The data is first compressed, encrypted and then hidden in the MP3 bit stream. Although MP3Stego has been written with steganographic applications in mind it might be used as a copyright marking system for MP3 files (weak but still much better than the MPEG copyright flag defined by the standard). Any opponent can uncompress the bit stream and recompress it; this will delete the hidden information – actually this is the only attack we know yet – but at the expense of severe quality loss.

The hiding process takes place at the heart of the Layer III encoding process namely in the inner_loop. The inner loop quantizes the input data and increases the quantiser step size until the quantized data can be coded with the available number of bits. Another loop checks that the distortions introduced by the quantization do not exceed the threshold defined by the psycho acoustic model. The part2_3_length variable contains the number of main_data bits used for scalefactors and Huffman code data in the MP3 bit stream. We encode the bits as its parity by changing the end loop condition of the inner loop. Only randomly chosen part2_3_length values are modified; the selection is done using a pseudo random bit generator based on SHA-1.

We have discussed earlier the power of parity for information hiding. MP3Stego is a practical example of it. There is still space for improvement but I thought that some people might be interested to have a look at it.

Full C code and binaries (Last update 11 February 1999):