Author:
- Name: Daniel Vik
Location: US - United States of America (United States)
To build:
make
This entry requires Zlib. See the FAQ on “zlib”.
There is an alternate version which might work for Windows. See Alternate code section below.
Bugs and (Mis)features:
The current status of this entry is:
STATUS: INABIAF - please DO NOT fix
For more detailed information see 2012/vik in bugs.html.
To use:
To embed text (from file or command line):
./vik e base.png filename > encodedimg.png
or
./vik e base.png SomeRandomText > encodedimg.png
To extract the embedded text:
./vik d encodedimg.png
To embed a PNG into another:
./vik e base.png source.png > encodedimg.png
To extract the embedded PNG:
./vik d encodedimg.png > restored.png
Try:
./try.sh
Alternate code:
For those few who might use Windows this alternate code might work.
Alternate build:
make alt
Alternate use:
Use vik.alt
as you would vik
above.
Judges’ remarks:
References to chocolate had no effect on judging this entry. We guarantee it.
Can you discern hidden pieces of chocolate in:
Author’s remarks:
Introduction
This program is a steganography application for embedding an image or text into another image as well as extracting the embedded image or text back. The program stores the embedded image or text in the low bits of the RGB values.
The program supports any 8 bit true color PNG images (RGB, RGBA, greyscale, and greyscale+alpha). The output image is always 8 bit RGB. When embedding one image into another, the width and height needs to be the same.
The program only updates the IDAT
and IHDR
chunks of the source image. Any
additional chunks are copied into the resulting image.
Bonus Extractor:
For some reason the chocolate image seems to have some special properties. Apart from being quite big and a little bit noisy, it appears that when embedded into another image and extracted, the bitmap data is also a valid brainfuck program. It is of course possible to get the bitmap data from the extracted image, and run it through any of the previous winning brainfuck interpreters, but I thought it would be easier to include an interpreter in the program to avoid the hassle:
./vik e ioccc.png chocolate.png > encodedimg.png
./vik b encodedimg.png
It is of course also possible to embed a brainfuck program as a text file (as explained above) and decode it, e.g.:
./vik e ioccc.png .+[.+] > encodedimg.png
./vik b encodedimg.png
Obfuscation
I really wanted to keep the program simple, so instead of adding multiple macros
or helper methods that can be confusing, I placed all functionality in the
main()
function. main()
is called recursively and quite extensively, but it
gives the benefit that all invocations of the function have the same parameters,
argv
and argc
. This really helps readability, as a programmer doesn’t need
to remember several variable or function names. I also tried to reduce the
number of keywords, and the program only has four for
loops followed by a single
return
statement. There is a little bit of use of the ternary (?:
) operator,
but this is really there to keep the program as simple as possible.
Portability
The program is portable to most platforms that have zlib
available. The only system dependency is that the program relies on writing
binary data to stdout
.
By default, Microsoft compilers adds carriage returns to new lines, and to compile the program on this platform, the following line can be added after the variable declarations in the main declaration in order to run correctly:
_setmode(_fileno(stdout), 0x8000);
NOTE: this is what the Alternate code does.
Limitations
The program doesn’t have many error checks so passing in invalid arguments or images of mismatching sizes, or unsupported pixel formats will cause the program to crash.
Extendability
Since a lot of care was taken to keep the code simple, it turned out to be quite easy to extend functionality. I did include a small brainfuck after I realized that the chocolate image had some interesting properties.
But there is more functionality I added that didn’t fit within the size limits and could not remain included. For example, I added a method to format source code based on a PNG image. So the format of the program is actually done by the program itself.
And to be honest, the chocolate image did not have a brainfuck program embedded to begin with. I added functionality to the program to embed a brainfuck into a PNG image and used it to create the image provided with the entry.
I also added a method to analyze PNG images, to print the size and format, as well as the scan line filters.
All these features were quite easy to add, much thanks to the (actually pretty good) design of the code.
Inventory for 2012/vik
Primary files
- vik.c - entry source code
- Makefile - entry Makefile
- vik.alt.c - alternate source code
- vik.orig.c - original source code
- chocolate.png - message or image encoded in picture of chocolate candy
- ioccc.png - message or image encoded in ioccc image
- try.sh - script to try entry
Secondary files
- 2012_vik.tar.bz2 - download entry tarball
- README.md - markdown source for this web page
- .entry.json - entry summary and manifest in JSON
- .gitignore - list of files that should not be committed under git
- .path - directory path from top level directory
- index.html - this web page