Winter photography

With the transition to daylight saving time, it is now guaranteed that I will be leaving work in darkness until spring is approaching. This is a bit disheartening in itself, and it also poses a challenge in terms of producing photos of the day for this site.

The best option is probably to undertake some more purpose-driven photo shoots. Normally, my approach is just to take photos in situations that I would find myself in anyhow. This has the virtue of not requiring too much time, but it makes it harder and harder to produce quality original images the longer you live in a certain place and continue to act in certain ways. Making a conscious choice to shoot some specific subjects or places could be fun, and could produce some good images. So could experimenting with some new techniques, styles, or equipment.

I have been pondering shelling out the cash for a fancy digital SLR camera. I think I should use the possibility for some self-motivation, and insist on doing some artistic work with my old P&S before I shell out more than $500 for a new light-trapping box.

Attacking encrypted bitmaps

Just because your photos are encrypted, it doesn’t seem that you can count on them to be totally unreadable to someone without the key. The attack only seems to work against bitmap images, so those secret JPGs, PNGs, and GIFs should be safe for now. This is because most types of files contain significantly more entropy than bitmaps. That is to say, there is a lot more redundant information in a BMP file than there is in something compressed. Even in the case of the vulnerable images, the technique can only produce “the outline of a high-contrast image.”

Once again, it proves the statement that ‘you can’t hide secrets from the future with math.’ Cryptographic attacks – and the resources available to attackers – will only keep increasing over time.

Enforcing open source licenses

An American court has ruled in favour of Robert Jacobsen – a man who wrote software for model trains and released it under an open source license. Ignoring the requirement in the license that derivative work credit the original and provide the original code, a commercial company made a product using the code. Under this court decision, the violation of the open source license means that the company’s behaviour consitutes copyright infringement.

I personally see a lot of value to the ‘some rights reserved’ approach of Creative Commons and others. By not requiring payment for non-commercial usage, such licenses can avoid blocking the experimentation of hobbyists. By reserving rights over later commercial usage, they prevent the abuse of materials created for general public usage. Such licenses provide the flexibility to share, along with the assurance that others will share in return.

Seeing the legal integrity of such contracts upheld is thus especially gratifying. For information on the Creative Commons license applied to my blog posts and photographs, see this page.

Editing video using still photos

Recently, there was controversy about a doctored photograph showing four Iranian missiles launching, whereas the original apparently showed three and one on the ground. Errol Morris discussed the images on the website of the New York Times.

Photo and video editing are nothing new, but some new software seeks to make the former much easier. It combines video data with that from still photographs in order to accomplish many possible aims. For instance, it could be used to improve the resolution of a whole scene or elements within it. It could also correct for over- and under-exposed regions. Of course, it could also facilitate video manipulation. The skills and software required to edit still images are increasingly available. Combine that with this software and you could empower a slew of new video fraudsters.

It will be interesting to see what kind of countermeasures emerge from organizations concerned about data integrity. One route is forensic – identifying markers of manipulation and tools for uncovering them. Another relies on requiring technologies and techniques for those capturing and submitting video. That could involve the expectation of multiple independent photos and videos produced from different angles using different equipment, or perhaps the widespread deployment of timestamps and cryptographic hashing to strengthen data integrity.

Farewell to Emily

Emily is off today: wisely fleeing the city of Ottawa before the slide towards winter accelerates. Back in May, she was charged with assessing the ‘coolness’ of Ottawa. Her very concise conclusions are now available.

Her departure is much to be regretted, though I would surely choose the same course myself if not bound here by unique employment opportunities. In any case, some photos of the summer are available online: I, II, III, IV, V, VI, VII.