Why Image Quality Drops When Resizing a JPEG (and How to Fix It)
Ever tried resizing an image only to end up with a blurry, pixelated mess? Whether you’re adjusting a… Continue reading Why Image Quality Drops When Resizing a JPEG (and How to Fix It)
Collaborate Disseminate
Ever tried resizing an image only to end up with a blurry, pixelated mess? Whether you’re adjusting a… Continue reading Why Image Quality Drops When Resizing a JPEG (and How to Fix It)
Let’s say the user is visiting sensitive.com and uploads some sensitive image sensitive.com/private.png. This image can be read with a GET request but requires authentication via a session cookie.
Now, the user visits another site evil.com… Continue reading Social engineering attack using simple HTML <img> tags. Is it possible?
first of all thank you for your time, right now im trying to solve this ctf challenge: (Category – Misc), Description: "In the neon-soaked streets of Helix City, an underground courier group called the Neon Runners uses glitched billb… Continue reading CTF – .png , Help/Hint
I’m trying to solve this ctf challenge: (Category – Misc), Description:
"In the neon-soaked streets of Helix City, an underground courier
group called the Neon Runners uses glitched billboards to pass secret
messages.
You’ve intercep… Continue reading CTF finding flag in an image [closed]
In my research on image encryption, I use the metrics below to evaluate the level of distortion between the original image ( I ) and its encrypted version ( I’ ):
MSE (Mean Squared Error)
MAE (Mean Absolute Error)
PSNR (Peak Signal-to-Noi… Continue reading What are the acceptable ranges of MSE, MAE, and PSNR values in the context of image encryption?
On this AskUbuntu answer about removing EXIF metadata with ImageMagick:
Remove EXIF data is not the same as anonymize: -strip will recompress the image. This might be a good thing: The same software that take the photo (or other) could hi… Continue reading Imagemagick -strip recompression removing hidden data
I’m reading about Error Level Analysis (ELA) in image forensics as means to detect if modifications were made to a photo. ELA is nicely described here: https://fotoforensics.com/tutorial.php?tt=ela. Also below examples are from that site.
… Continue reading Is Error Level Analysis (ELA) in image forensics a reliable indicator for detecting digital modifications?
Our system produces preview images of A4 documents, which contain sensitive data (email, phone numbers, social networks and adresses) of our users. We would like to save those preview images in our cloud, to later present them to the corre… Continue reading Extraction of sensitive data out of down- scaled images
When I click on a Google image thumbnail to view a larger preview, I understand that the image is hotlinked from the hosting site.
In this case, when I view the hotlinked Google preview image, is my IP address recorded by the original site… Continue reading When viewing a hotlinked Google image preview, is the IP address of Google’s server recorded on the original site?

Docker and other containerization applications have changed a lot about the way that developers create new software as well as how they maintain virtual machines. Not only does containerization reduce …read more Continue reading Putting a Pi in a Container