473,385 Members | 1,693 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,385 software developers and data experts.

Usual way to hide jpegs. Extraction off application jpgs??

I have an application that I think was developed using some form of
Borland C with a folder for BIG images with the extension .fre. When I
try to view them they cannot be read even by changing the extension
to jpg, bmp, zip, etc.

I also used some utilities for resource extraction with no success.

I know the images are there and there has to be a way to show and
convert them to a known format. I have seen libjpeg.dll and zlib.dll
in the main application folder along with other dlls.

Please suggest some utility or tell me the way developers usually hide
application jpg images (not icons, etc).

Thanks
Nov 14 '05 #1
8 1399
"markus" <m7***@hotpop.com> wrote in message

Please suggest some utility or tell me the way developers usually > hide application jpg images (not icons, etc).

This isn't really on topic for clc. The best bet is to examine the file in a
hex / ascii combined view editor and see if you can make sense of the data,
then write a program to extract it. However if the developer really doesn't
want you to access the images then he will encrypt them and it is skilled
reverse engineering job to break the protection.
Nov 14 '05 #2
Have you tried the Unix utility called "file"?
Nov 14 '05 #3
markus wrote:

I have an application that I think was developed using some form of
Borland C with a folder for BIG images with the extension .fre. When I
try to view them they cannot be read even by changing the extension
to jpg, bmp, zip, etc.

I also used some utilities for resource extraction with no success.
Changing the filename doesn't change the format of the file. If the
file isn't in jpg, bmp, or zip format, changing the extension isn't
going to do anything except confuse things.

What is a ".fre" file? What format is it in? Do you have any programs
that know how to read such files?
I know the images are there and there has to be a way to show and
convert them to a known format. I have seen libjpeg.dll and zlib.dll
in the main application folder along with other dlls.

Please suggest some utility or tell me the way developers usually hide
application jpg images (not icons, etc).


Who said they were jpg's?

--
+-------------------------+--------------------+-----------------------------+
| Kenneth J. Brody | www.hvcomputer.com | |
| kenbrody at spamcop.net | www.fptech.com | #include <std_disclaimer.h> |
+-------------------------+--------------------+-----------------------------+

Nov 14 '05 #4
..fre seems to be just a way to disguise the file since this extension
does not appear even in comprehensive Internet lists of file
extensions.

I know that changing the extension to a known format does not convert
the file itself but sometimes file readers can't read a particular
image with different than expected extension just because of the
extension even though the format may be well known and readable.
Nov 14 '05 #5
On Sat, 26 Jun 2004, markus wrote:
I have an application that I think was developed using some form of
Borland C with a folder for BIG images with the extension .fre. When I
try to view them they cannot be read even by changing the extension
to jpg, bmp, zip, etc.

I also used some utilities for resource extraction with no success.

I know the images are there and there has to be a way to show and
convert them to a known format. I have seen libjpeg.dll and zlib.dll
in the main application folder along with other dlls.

Please suggest some utility or tell me the way developers usually hide
application jpg images (not icons, etc).


As a developer I have numerous ways of encrypting data. I can use a simple
Caesar cipher. I can reverse the data. I can flip the bits. I can store it
as char in memory but read/write it as long on a little endian machine
(flips every four bytes). The options are limitless.

Typically, performance and my imagination are the only things limiting how
I can encrypt the data. Obviously, I'm going to pick a method that is easy
to decrypt but that will not be obvious to someone looking at the data.

If might even encrypt the header information differently then the body. Or
I might just encrypt the header and leave the body unaltered.

Are you getting the idea? There is no standard way to do this. Being
non-standard is part of the security. Mystery makes your job harder so I'm
going to pick something that I have not seen before or I'm going to
combine two methods I have seen before to come up with something new.

More importantly, why would the developer use a non-standard format for
their image data? Could it be that they don't want you to decrypt the
images? By helping you wouldn't I be hurting the developer? Why wouldn't I
want to help the developer by not helping you?

I would hope that other developers would respect my choice to encrypt the
data and not help someone steal my images.

--
Send e-mail to: darrell at cs dot toronto dot edu
Don't send e-mail to vi************@whitehouse.gov
Nov 14 '05 #6

"Darrell Grainger" <da*****@NOMORESPAMcs.utoronto.ca.com> wrote in message

I would hope that other developers would respect my choice to encrypt > the data and not help someone steal my images.

That's only one reason for not using a standard format. The developer might
simply want the convenience of packing all images in one file. Or if he is
writing a game or an educational program he might want to prevent users from
viewing the images before the intended time in the program.
Nov 14 '05 #7
Technically, by decrypting the images I am not stealing anything since
they are, so to speak, "mine" too. The are a series of maps
distributed on CDROM by the government. That is, I have already paid
the developer for them: as a tax-payer and as a CD-ROM buyer.

I know there can be many ways to encrypt the files but since there is
no BIG reason to go to great lengths with the encryption I tend to
think it is just a casual very simple disguise, whick I am trying to
determine.

I am sure they are images since they are in a folder called maps with
names corresponding to maps seen within the application.

When I developed applications in Qbasic there were libraries of images
that could be accessed within the aplication. In this case teh folder
has many images. it is not a library of images but separate files.
Maybe there's no standard way but there has to be at least a couple of
USUAL ways to do that and some form of viewer to bring them up.

I used a multiformat viewer that could not open them.
Nov 14 '05 #8
On 28 Jun 2004 17:34:53 -0700, m7***@hotpop.com (markus) wrote:
Technically, by decrypting the images I am not stealing anything since
they are, so to speak, "mine" too. The are a series of maps
distributed on CDROM by the government. That is, I have already paid
the developer for them: as a tax-payer and as a CD-ROM buyer.

I know there can be many ways to encrypt the files but since there is
no BIG reason to go to great lengths with the encryption I tend to
think it is just a casual very simple disguise, whick I am trying to
determine.

I am sure they are images since they are in a folder called maps with
names corresponding to maps seen within the application.

When I developed applications in Qbasic there were libraries of images
that could be accessed within the aplication. In this case teh folder
has many images. it is not a library of images but separate files.
Maybe there's no standard way but there has to be at least a couple of
USUAL ways to do that and some form of viewer to bring them up.

I used a multiformat viewer that could not open them.


There are many thousands of image and map formats, most of them
proprietary.

You might want to try the newsgroup sci.image.processing. This is
definitely not a C programming issue.

E-mail me if you would like me to take a quick look at a couple of
samples. I am familiar with hundreds of image formats and some vector
formats.

--
Sev
Nov 14 '05 #9

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

3
by: Aaron Davies | last post by:
I'm trying to write some classes for my collaborative whiteboard to transmit images over the network, using the javax.imageio API, but I'm running into an odd problem: my code words fine with PNGs,...
0
by: Ryan Cooper | last post by:
Hello .NET Gurus! I have been posting messages all over the .NET forums to no avail, so I thought I'd give this newsgroup a shot as well. I am trying to figure out how to detect if a...
3
by: M.L. | last post by:
Hi. I would like to use Javascript to load specific database entries into an HTML template. Is it possible, for example, for Javascript to read entries of an Excel file and use specific cell data...
1
by: Ecohouse | last post by:
I have created a MS Access Project linking to a SQL database. I created a table that I want to hold jpgs in. The actual field I created is a datatype of image. I created a form in Access. ...
7
by: C G | last post by:
Dear All, What's the best way to store jpgs in postgresql to use in a web page? I tried to use large objects, but how would you extract them from a table to be viewed in a web-page without...
1
by: kmazur | last post by:
Hello, I have a folder on the server g:\users\logos\. I need to create a web app that will display all the images in that folder (there are gifs, tiffs, jpegs and bmps) in thumbnail format and...
2
by: VivekR | last post by:
Hi All Please help me out with this thing in javascript. I am dumb in the world of JS/Html/... I have a url, say www.someurl.com. It has a list of jpgs that can accessed as...
0
by: cyberdwarf | last post by:
Hi I've been trying to sort this one for a couple of months now, without getting a definitive solution! I have a client spec which requires us to store JPG photos (thumbnails) within the record...
8
by: J. Frank Parnell | last post by:
Hi there, I got this directory tree listing function somewhere, it works great, but I want it to only list directories that do have one or more .jpgs inside. I tried getting a list of each dir's...
0
by: taylorcarr | last post by:
A Canon printer is a smart device known for being advanced, efficient, and reliable. It is designed for home, office, and hybrid workspace use and can also be used for a variety of purposes. However,...
0
by: ryjfgjl | last post by:
In our work, we often receive Excel tables with data in the same format. If we want to analyze these data, it can be difficult to analyze them because the data is spread across multiple Excel files...
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
1
by: nemocccc | last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
1
by: Sonnysonu | last post by:
This is the data of csv file 1 2 3 1 2 3 1 2 3 1 2 3 2 3 2 3 3 the lengths should be different i have to store the data by column-wise with in the specific length. suppose the i have to...
0
by: Hystou | last post by:
There are some requirements for setting up RAID: 1. The motherboard and BIOS support RAID configuration. 2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
0
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
0
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers,...
0
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.