Flutterby™! : Hacking JPEG

Next unread comment / Catchup all unread comments User Account Info | Logout | XML/Pilot/etc versions | Long version (with comments) | Weblog archives | Site Map | | Browse Topics

Hacking JPEG

2011-02-07 19:14:55.049317+01 by Dan Lyke 1 comments

Oooh! Cool idea! JPEG canaries: exposing on-the-fly recompression.

Our algorithm works by adding a high-frequency pattern to the image with an amplitude carefully selected to cause maximum quantization error on recompression at a chosen target JPEG quality factor. The amplitude is modulated with a covert warning message, so that foreground message blocks experience maximum quantization error in the opposite direction to background message blocks. While the message is invisible in the marked original image, it becomes visible due to clipping in a recompressed copy.

What's also cool is how their sample images look as you scale 'em on the iPad.

Hat tip to MarkV.

comments in ascending chronological order (reverse):

#Comment Re: made: 2011-02-08 13:34:16.244948+01 by: DaveP

Spiffy! I had figured such a thing was possible, but had never figured out the math to make it happen.

Comment policy

We will not edit your comments. However, we may delete your comments, or cause them to be hidden behind another link, if we feel they detract from the conversation. Commercial plugs are fine, if they are relevant to the conversation, and if you don't try to pretend to be a consumer. Annoying endorsements will be deleted if you're lucky, if you're not a whole bunch of people smarter and more articulate than you will ridicule you, and we will leave such ridicule in place.


Flutterby™ is a trademark claimed by

Dan Lyke
for the web publications at www.flutterby.com and www.flutterby.net.