MATERIAL: bends and breaks, from Material Evidence to Material Index
Material specificity VS material VS materiality
WRITTEN (THEORY)
>>> Vernacular of File Formats [pdf] (2010 - ..._)
>>> Sonification / Databending Workshop materials
>>>
ARTWORKS (PRACTICE)
>>>Videoscapes (2008 - ... )
>>> Un/Resolved (2020)
>>> Vernacular of File Formats (2010 - ... )
>>> Dear MR. Compression (2010)
>>> Monglot (glitch software) (2011)
>>> Extrafile vs Monglot (2011)
>>> Vernacular of File Formats [pdf] (2010 - ..._)
>>> Sonification / Databending Workshop materials
>>>
ARTWORKS (PRACTICE)
>>>Videoscapes (2008 - ... )
>>> Un/Resolved (2020)
>>> Vernacular of File Formats (2010 - ... )
>>> Dear MR. Compression (2010)
>>> Monglot (glitch software) (2011)
>>> Extrafile vs Monglot (2011)
WRITTEN (THEORY)
ECOLOGY OF DCT MACROBLOCKS
>>> DCT: THE GUY BEHIND THE GUY BEHIND THE GUY (2015)
or: How Not to be Read (a recipe using Discrete Cosine Transform) [ pdf ]
ARTWORKS (PRACTICE)
>>> An Ecology of Compression Complexities (2017)
>>> DCT:SYPHONING. The 1000000th (64th) interval (2015 - 2017)
>>> DCT (CRYPTOGRAPHY) (2015)
>>> i.R.D. PATCH (with DCT key) (2015)
>>> JPEG (revision for Sotherby’s) (2023)
ECOLOGY OF DCT MACROBLOCKS
>>> DCT: THE GUY BEHIND THE GUY BEHIND THE GUY (2015)
or: How Not to be Read (a recipe using Discrete Cosine Transform) [ pdf ]
ARTWORKS (PRACTICE)
>>> An Ecology of Compression Complexities (2017)
>>> DCT:SYPHONING. The 1000000th (64th) interval (2015 - 2017)
>>> DCT (CRYPTOGRAPHY) (2015)
>>> i.R.D. PATCH (with DCT key) (2015)
>>> JPEG (revision for Sotherby’s) (2023)
- Schuppli, Susan. Dark Matters: an interview with Susan Schuppli, in: Living Earth, 2016.
“Materiality is reconceptualized as the interplay between a text's physical characteristics and its signifying strategies, a move that entwines instantiation and signification at the outset. This definition opens the possibility of considering texts as embodied entities while still maintaining a central focus on interpretation. It makes materiality an emergent property, so that it cannot be specified in advance, as if it were a pre-given entity. Rather, materiality is open to debate and interpretation, ensuring that discussions about the text's "meaning" will also take into account its physical specificity as well.”
- Hayles, N. Katherine. "Print is flat, code is deep: The importance of media-specific analysis." Poetics Today 25.1 (2004): 67-90.
A reflexive approach to materiality makes it possible to re-conceptualize materiality itself as ‘the interplay between a text’s physical characteristics and its signifying strategies’. Rather than thinking in the mediums’ material as fixed in physicality, a re-definition of materiality is useful because it opens the possibility of considering any text as embodied entity “while still maintaining a central focus on interpretation. In this view of materiality, it is not merely an inert collection of physical properties but a dynamic quality that emerges from the interplay between the text as a physical artifact, its conceptual content, and the interpretive activities of readers and writers.”
Reflections on materiality should not just happen on a technological level. To fully understand a work, each level of materiality should be studied: the physical and technological artifact, its conceptual content, and the interpretive activities of reader, artist and audience. [the choice of any] digital material is not innocent or meaningless. With enough knowledge of the material, an investigation into digital materialilty can uncover stories about the origin and history of the material, by others.
▁∣∖▁╱◝◟.❘╱▔▔╲̸/╲╱▔▔▔╲∣∖╱▔╲▁▁∣∖▁╱◝◟.╱▔▔╲________
How many efforts are required in order to watch?
Whenever I use a ‘normal’, transparent technology, I aim to see 'through' the actual machine. I have learned to unsee its interface and all its structural components. I am able to understand its message and use the technology as fast as possible. In a way I have learned to become blind to (certain parts of) technology.
Similar lines of development have taken place in my perception of sound. As Canadian composer R. Murray Schafer wrote: "We have no ear lids. We are condemned to listen. But this does not mean our ears are always open." Over the years I have learned to close my ear lids and even might have lost (or never developed) some of the sensitivities needed for 'deep listening' (or ‘deep watching’).
The quest to make the public re-hear certain sounds, to educate the listener and to 'open up ear lids', has been a subject pursued by many different sound artists. Acousmatics for instance, a strand of sound art developed by the French composer and pioneer of musique concrète Pierre Schaeffer, lets the audience listen to the sounds originating from behind a "black veil". The source or instrument of the sound remains unseen and unknown while the non-representational or formalist sound forces the audience to focus on active listening.
Has similar research and work been made in the visual arts? Does some form of acousmatic video or even acousmatic videoscapes exist? What would this look like and could glitch play a role in this?
While watching glitch art, the audience perceives glitches without (often) knowing how they came about, which gives them an opportunity to concentrate on their form - to interpret its structures and to learn more from what can actually be seen. In a sense many glitches follow the principle of acousmatics visually.
A videoscape should be a place where artists can create a new, visual ecology that can give playful feedback on the technological conventions that control the spectator in their everyday life. In these conceptually fueled videoscapes we can open our eyes for the unreasonable and give form to what we so often have tried to obfuscate in both audio and visual media, namely artifacts.
The main subject of most glitch art is 'critical perception'. Critical in this sense is twofold; either criticizing the way technology is conventionally perceived, or showing the medium in a critical state. Glitches release a critical potential that forces the viewer to actively reflect on the technology.
The acousmatic videoscape thus uses critical trans-media aesthetics to theorize the human thinking about technology; it creates an opportunity for self reflexivity, self critique and self expression.
The acousmatic videoscape is a space in which I can perceive output outside of my goggles of speed, transparency and usability. The new structures that unfold themselves can be interpreted as a portal to an utopia, a paradise like dimension, but also as a black hole that threatens to destroy the technology as I knew it. Here is a purgatory; an intermediate state between the death of the old technology and a judgement for a possible continuation into a new form of seeing and using, a new perspective…
︎ Videoscapes
8448 x 4 CM
long painting
on canvas,
or
data file
to be wrapped
on hardware
long painting
on canvas,
or
data file
to be wrapped
on hardware
8448 x 4 CM long painting on canvas, or data file,
to be wrapped over hardware (a painting of 32 x 32 pixels wide, 1 pixel deep, both sides)
Inspired by the 2011 works “Beyond Yes and No” and “29 PARALLEL STRIPES”, by Beflix,
UnResolved explores the fluidity of data and illustrates how the transition from analogue to digital incorporates both vertical quantitative resolution (as seen in analogue systems like PAL, which is 576p) and horizontal resolution.
Using a bitmap image, I followed the linear organization of pixelated data. In a .BMP (raster image data file), the image's luminance and chrominance data are encoded pixel by pixel in a linear sequence, one after the other.
In UnResolved, every pixel or data point is hand-painted onto a 64-meter-long canvas strip, which is then mounted on a frame. When wrapped correctly and unrolled over hardware with the right dimensions, UnResolved reveals a double-sided image: one side shows my portrait, and the other side displays a cryptographic message in DCT (a cryptographic tool developed in 2015): BEYONDRESOLUTION.
With UnResolved I demonstrate how a bitmap file, when ‘opened’ on different hardware, can generate alternate modes of reading, writing or seeing:
the hardware defines what is perceived.
to be wrapped over hardware (a painting of 32 x 32 pixels wide, 1 pixel deep, both sides)
Inspired by the 2011 works “Beyond Yes and No” and “29 PARALLEL STRIPES”, by Beflix,
UnResolved explores the fluidity of data and illustrates how the transition from analogue to digital incorporates both vertical quantitative resolution (as seen in analogue systems like PAL, which is 576p) and horizontal resolution.
Using a bitmap image, I followed the linear organization of pixelated data. In a .BMP (raster image data file), the image's luminance and chrominance data are encoded pixel by pixel in a linear sequence, one after the other.
In UnResolved, every pixel or data point is hand-painted onto a 64-meter-long canvas strip, which is then mounted on a frame. When wrapped correctly and unrolled over hardware with the right dimensions, UnResolved reveals a double-sided image: one side shows my portrait, and the other side displays a cryptographic message in DCT (a cryptographic tool developed in 2015): BEYONDRESOLUTION.
With UnResolved I demonstrate how a bitmap file, when ‘opened’ on different hardware, can generate alternate modes of reading, writing or seeing:
the hardware defines what is perceived.
some images of the making of: 32 stripes of canvas were encoded, sewn into a very long strip, and painted.
PDF: A Guide to Databend Compression Design, 2010.
The Vernacular of File Formats Archive (16GB of data) is part of the Base collection of Stedelijk Museum Amsterdam since 2016.
A file format is an encoding system that organises data according to a particular syntax. These organisations are commonly referred to as compression algorithms. The choice of an image compression depends on its foreseen mode and place of usage: for instance, is the file meant to be printed or redistributed digitally, what kind of accuracy will be necessary and what software or hardware will render the image?
In some cases the maker chooses not to use any encoding at all, but instead to store the data as an unprocessed file. Images shot by professional photographers for instance, will be shot and stored in a RAW image file format. A RAW image file contains minimally processed data, which normally comes straight from the image sensor (for instance a CCD chip), in order to avoid any impurities (artifacts) that might be involved with image mediation, transcoding or compression.
In A Vernacular of File Formats, I subsequently compressed the source image via different compression languages and subsequently implementing a same (or similar) error into each file, to let the otherwise invisible compression language presents itself onto the surface of the image.
︎︎ flickr documentation
︎Polish translation by Bogumiła Piotrowska, Piotr Puldzian Płucienniczak, Aleksandra Pieńkosz
︎Download the PDF
In the winter of 2016, a 18,9GB digital archive of A Vernacular of File Formats, consisting of original pdfs, a catalogue of databend images, videos and documentation was part of a joint acquisition between MOTI and Stedelijk Museum Amsterdam. ︎sonification workshop
When noise becomes filter art [ or when cool becomes hot ], (2010 / edited 2017)
Glitches are hot. It is clear from what we see on MTV, Flickr, in the club or in the bookstore: while the Glitch: Designing Imperfection (Moradi, 2009) coffee table book introduced a glitch design aesthetic to the world of latte drinking designers, Kanye West used a glitch aesthetic to illustrate his broken love life.
But while glitch design fulfills an average, imperfect stereotype, a filter or commodity that echoes a medium is the message-standard, naturally, the “No Content - Just Imperfection” slogan of hot glitch design is still complimented by cool glitches.
In "The Laws of Cool", Alan Liu asks himself: What is "Cool"? He describes that cool is the ellipsis of knowing what is cool, and withholding that idea. However, as Liu writes, those who insist on asking, are definitely uncool. In an effort to answer the question that cannot be answered, and come full circle on the ellipsis, I will try to give my take on what cool glitch can be. To me, cool glitch is represented by the glitches that do not (only) focus on a static end product, but (also) on a process, a personal exploration or a narrative element (that often reflects critically on a medium). This is why cool is in a constant state of flux; it exists as an assemblage that consists of on the one hand the construction, operation and content of the apparatus (the medium) and on the other hand the work, the writer/artist, and the interpretation by the reader and/or user (the meaning). In the end, there is not one definition of cool glitch art, but many, which depend on the perspective chosen.
To make what was once cool now hot, or visa versa, and to take Designing Imperfection one step further, I hereby offer you A Vernacular of File Formats. In this PDF I describe the ways to exploit and deconstruct the organizations of file formats into new, brutalist designs.
…I am waiting for the first “Glitchs not dead“ peace of clothing in H&M. And because "fans are as bad as the ignorant", for the sake of being bad and ignorant, I will wear it!
Vernacular of File Formats (2009-2010). Photoshop RAW, JPEG, JPEG 2000, PNG, BMP, Photoshop, TIFF, GIF, Targa.
Digital Prints on Dibond (matte finish).
Digital Prints on Dibond (matte finish).
AN ECOLOGY OF DCT MACROBLOCKS
WRITTEN (THEORY)
* MACROBLOCKS
>>> DCT: THE GUY BEHIND THE GUY BEHIND THE GUY (2015)
or: How Not to be Read (a recipe using Discrete Cosine Transform) [ pdf ]
SEMINAR SLIDES
>> ALT.HISTORY (A Genealogy of Macroblocks)
ARTWORKS (PRACTICE)
>>> An Ecology of Compression Complexities (2017)
>>> DCT:SYPHONING. The 1000000th (64th) interval (2015 - 2017)
>>> DCT (CRYPTOGRAPHY) (2015)
>>> i.R.D. PATCH (with DCT key) (2015)
from one plane of complexity (2017)
A map of the different complexities of compression artifacts featuring the realms of:
━ Lines
(interlacing, interleaving, scan line, border, beam)
(interlacing, interleaving, scan line, border, beam)
▩ Blocks
(macroblocks, cluster)
(macroblocks, cluster)
⌇ Wavelets
(JPEG2000)
⟗ Vectors
(3D obj, time encoding in MPEG4)
(3D obj, time encoding in MPEG4)
3 screen installation version. For VR read below.
About
An exploration of the Ecology of Compression Complexities.
DCT:SYPHONING is a contemporary translation of the 1884 Edwin Abbott Abbott roman “Flatland”. The work describes some of the algorithms at work in digital image compression.
Inspired by Syphon, an open source software by Tom Butterworth and Anton Marini, in DCT:SYPHONING, an anthropomorphised DCT (Senior) narrates its first SYPHON (data transfer) together with DCT Junior, and their interactions as they translate data from one image compression to a next (aka the “realms of complexity”).
As Senior introduces Junior to the different levels of image plane complexity, they move from blocks (the realm in which they normally resonate), to dither, lines and the more complex realms of wavelets and vectors. Junior does not only react to old compressions technologies, but also the newer, more complex ones which ‘scare' Junior, because of their 'illegibility'.
DCT:SYPHONING at JMAF, Tokyo, Japan, 2017
PDF Version
The full edition of Lune Magazine 3 can be downloaded here:
https://lunejournal.org/03-display/
This edition was guest edited by Nathan Jones
https://alittlenathan.co.uk/
Spanish Translation
>>
An exploration of the Ecology of Compression Complexities.
DCT:SYPHONING is a contemporary translation of the 1884 Edwin Abbott Abbott roman “Flatland”. The work describes some of the algorithms at work in digital image compression.
Inspired by Syphon, an open source software by Tom Butterworth and Anton Marini, in DCT:SYPHONING, an anthropomorphised DCT (Senior) narrates its first SYPHON (data transfer) together with DCT Junior, and their interactions as they translate data from one image compression to a next (aka the “realms of complexity”).
As Senior introduces Junior to the different levels of image plane complexity, they move from blocks (the realm in which they normally resonate), to dither, lines and the more complex realms of wavelets and vectors. Junior does not only react to old compressions technologies, but also the newer, more complex ones which ‘scare' Junior, because of their 'illegibility'.
DCT:SYPHONING at JMAF, Tokyo, Japan, 2017
PDF Version
The full edition of Lune Magazine 3 can be downloaded here:
https://lunejournal.org/03-display/
This edition was guest edited by Nathan Jones
https://alittlenathan.co.uk/
Spanish Translation
>>
Production of DCT:SYPHONING
DCT:SYPHONING was first commissioned by the Photographers Gallery in London, for the show Power Point Polemics. This version was on display as a Powerpoint Presentation; a .ppt (Jan - Apr 2016).
A 3 channel video installation was conceived for the 2016 Transfer Gallery's show "Transfer Download", first installed at Minnesota Street Project in San Francisco (July - September, 2016)
DCT:SYPHONING released as VR, commissioned as part of DiMoDA’s Morphe Presence and later as stand alone (2017).
>>
DCT:SYPHONING @the Current museum for contemporary art, NY, USA
In my solo show Behind White Shadows, DCT:SYPHONING was projected on a 4 meter high custom build spomenik (memorial)
DCT:SYPHONING was first commissioned by the Photographers Gallery in London, for the show Power Point Polemics. This version was on display as a Powerpoint Presentation; a .ppt (Jan - Apr 2016).
A 3 channel video installation was conceived for the 2016 Transfer Gallery's show "Transfer Download", first installed at Minnesota Street Project in San Francisco (July - September, 2016)
DCT:SYPHONING released as VR, commissioned as part of DiMoDA’s Morphe Presence and later as stand alone (2017).
>>
DCT:SYPHONING @the Current museum for contemporary art, NY, USA
In my solo show Behind White Shadows, DCT:SYPHONING was projected on a 4 meter high custom build spomenik (memorial)
<*href: Cory Arcangel: on Compression, 2007>
A Discrete Cosine Transform or 64 basis functions of the JPEG compression (Joint Photographic Experts Group) 8 x 8 pixel macroblocks.
The .JPEG compression consists of these six subsequent steps
1. Color space transformation. Initially, the image has to be transformed from the RGB colorspace to
Y′CbCr. This colorspace consists of three components that are handled separately; the Y’ (luma or brightness) and the Cb and Cr values; the blue-difference and red-difference Chroma components.
2. Downsampling. Because the human eye doesn’t perceive small differences within the Cb and Cr space very well, these elements are downsampled, a process that reduces its data dramatically.
3. Block splitting. After the colorspace transformation and downsampling steps, the image is split into 8 x 8 pixel tiles or macroblocks, which are transformed and encoded separately.
4. Discrete Cosine Transform. Every Y’CbCr macroblock is compared to all 64 basis functions (base cosines) of a Discreet Cosine Transform. A value of resemblance per macroblock per base function is saved in a matrix, which goes through a process of reordering.
5. Quantization. The JPEG compression employs quantization, a process that discards coefficients with values that are deemed irrelevant (or too detailed) visual information. The process of quantization is optimized for the human eye, tried and tested on the Caucasian Lena color test card.
Effectively, during the quantization step, the JPEG compression discards most of all information within areas of high frequency changes in color (chrominance) and light (luminance), also known as high contrast areas, while it flattens areas with low frequency (low contrasts) to average values, by re-encoding and deleting these parts of the image data. This is how the rendered image stays visually similar to the original – least to human perception. But while the resulting image may look similar to the original, the JPEG image compression is Lossy, which means that the original image can never be reconstructed.
6. Entropy coding. Finally, a special form of lossless compression arranges the macroblocks in a zigzag order. A Run-Length Encoding (RLE) algorithm groups similar frequencies together while Huffman coding organizes what is left.
Revealing the surface and structure of the image *
<href: Ted Davis: ffd8, 2012>
A side effect of the JPEG compression is that the limits of the images’ resolution – which involve not just the images’ number of pixels in length and width, but also the luma and chroma values, stored in the form of 8 x 8 pixel macroblocks – are visible as artifacts when zooming in beyond the resolution of the JPEG.
Because the RGB color values of JPEG images are transcoded into Y’CbCr macroblocks, accidental or random data replacements can result into dramatic discoloration or image displacement. Several types of artifacts can appear; for instance ringing, ghosting, blocking, and staircase artifacts. The relative size of these artifacts demonstrates the limitations of the JPEGs informed data: a highly compressed JPEG will show relatively larger, block-sized artifacts.
HOW NOT TO BE READ* [ a recipe using DCT ENCRYPTION ]
<href: Hito Steyerl: How Not to Be Seen, 2013>
The legibility of an encrypted message does not just depend on the complexity of the encryption algorithm, but also on the placement of the data of the message. Here they are closely connected to resolutions: resolutions determine what is read and what is unseen or illegible.
DCT ENCRYPTION (2015) uses the aesthetics of JPEG macroblocks to mask its secret messages on the surface of the image, mimicking error. The encrypted message, hidden on the surface is only legible by the ones in the know; anyone else will ignore it like dust on celluloid.
While the JPEG compession consists of 6 steps, the basis of the compression is DCT, or Discrete Cosine Transform. During the final, 6th step of the JPEG compression, entropy coding, a special form of lossless data compression, takes place. Entropy coding involves the arranging the image components in a "zigzag" order, using run-length encoding (RLE) to group similar frequencies together.
How Not to be Read, a recipe using DCT:
︎ for the #3D Additivist Cookbook.
︎ DCT won the Crypto Desgin Challenge Award in 2015.
<href: Hito Steyerl: How Not to Be Seen, 2013>
A PDF with this work is downloadable here
The legibility of an encrypted message does not just depend on the complexity of the encryption algorithm, but also on the placement of the data of the message. Here they are closely connected to resolutions: resolutions determine what is read and what is unseen or illegible.
DCT ENCRYPTION (2015) uses the aesthetics of JPEG macroblocks to mask its secret messages on the surface of the image, mimicking error. The encrypted message, hidden on the surface is only legible by the ones in the know; anyone else will ignore it like dust on celluloid.
While the JPEG compession consists of 6 steps, the basis of the compression is DCT, or Discrete Cosine Transform. During the final, 6th step of the JPEG compression, entropy coding, a special form of lossless data compression, takes place. Entropy coding involves the arranging the image components in a "zigzag" order, using run-length encoding (RLE) to group similar frequencies together.
How Not to be Read, a recipe using DCT:
- Choose a lofi JPEG base image on which macroblocking artifacts are slightly apparent. This JPEG will serve as the image on which your will write your secret message.
- If necessary, you can scale the image up via nearest neighbour interpolation, to preserve hard macroblock edges of the base image.
- Download and install the DCT font
- Position your secret message on top of the JPEG. Make sure the font has the same size as the macroblock artifacts in the image
- Flatten the layers (image and font) back to a JPEG. This will make the text no longer selectable and readable as copy and paste data.
︎ for the #3D Additivist Cookbook.
︎ DCT won the Crypto Desgin Challenge Award in 2015.
A Discrete Cosine Transform simplified to make a monochrome .ttf font and iRD logo. In the logo RLE 010 000 - 101 1111 signifies the key to the DCT encryption: 010 000 - 101 1111 are the binary values of the 64 most used ASCII glyphs, which are then mapped onto the DCT in a zig zag order (following RLE).
Discrete Cosine Transform (DCT) was first conceived for the Crypto Design Challenge
“A recipe using DCT” was released in the #Additivism cookbook.
Mesmerized by the screen, focusing on the moves of a next superhero, I was conditioned to ignore the dust imprinted on the celluloid or floating around in the theater, touching the light of the projection and mingling itself with the movie.
The dust – micro-universes of plant, human and animal fibers, particles of burnt meteorites, volcanic ashes, and soil from the desert – could have told me stories reaching beyond my imagination, deeper and more complex than what resolved in front of me, reflecting from the movie screen.
… But I never paid attention.
I focused my attention to where I was conditioned to look: to the feature, reflecting from the screen. All I saw were the images. I did not see the physical qualities of the light nor the materials making up its resolution; before, behind, and beyond the screen.
Decennia of conditioning the user to ignore these visual artifacts and to pay attention only to the overall image has changed these artifacts into the ultimate camouflage for secret messaging. Keeping this in mind, I developed DCT.
Premise of DCT is the realisation that the legibility of an encrypted message does not just depend on the complexity of the encryption algorithm, but also on the placement of the message. This encrypted message, hidden on the surface of the image, is only legible by the ones in the know; anyone else will ignore it. Like dust on celluloid, DCT is mimics JPEG error. It appropriates the algorithmic aesthetics of JPEG macroblocks to stenographically mask a secret message, mimicking error. The encrypted message, hidden on the surface of the image, is only legible by the ones in the know.
“A recipe using DCT” was released in the #Additivism cookbook.
Mesmerized by the screen, focusing on the moves of a next superhero, I was conditioned to ignore the dust imprinted on the celluloid or floating around in the theater, touching the light of the projection and mingling itself with the movie.
The dust – micro-universes of plant, human and animal fibers, particles of burnt meteorites, volcanic ashes, and soil from the desert – could have told me stories reaching beyond my imagination, deeper and more complex than what resolved in front of me, reflecting from the movie screen.
… But I never paid attention.
I focused my attention to where I was conditioned to look: to the feature, reflecting from the screen. All I saw were the images. I did not see the physical qualities of the light nor the materials making up its resolution; before, behind, and beyond the screen.
Decennia of conditioning the user to ignore these visual artifacts and to pay attention only to the overall image has changed these artifacts into the ultimate camouflage for secret messaging. Keeping this in mind, I developed DCT.
Premise of DCT is the realisation that the legibility of an encrypted message does not just depend on the complexity of the encryption algorithm, but also on the placement of the message. This encrypted message, hidden on the surface of the image, is only legible by the ones in the know; anyone else will ignore it. Like dust on celluloid, DCT is mimics JPEG error. It appropriates the algorithmic aesthetics of JPEG macroblocks to stenographically mask a secret message, mimicking error. The encrypted message, hidden on the surface of the image, is only legible by the ones in the know.
Making the Sun write cryptographic shadow messages wit DCT.
DCT at MOTI for the Crypto design challenge
encrypted text:
The legibility of an encrypted message does not just depend on the complexity of the encryption algorithm, but also on the placement of the data of the message.
The Discreet Cosine Transform is a mathematical technique. In the case of the JPEG compression, a DCT is used to describe a finite set of patterns, called macroblocks, that could be described as the 64 character making up the JPEG image, adding lumo and chroma values as ‘intonation’.
If an image is compressed correctly, its macroblocks become ‘invisible’. The incidental trace of the macroblocks is generally ignored as artifact or error.
Keeping this in mind, I developed DCT. DCT uses the esthetics of JPEG macroblocks to mask its secret message as error. The encrypted message, hidden on the surface of the image is only legible by the ones in the know.
︎ A PDF about this work is downloadable here
︎ Visit the DCT ENCRYPTION STATION (2022, w/ Ted Davis) here
︎ DCT DECOY with Erik Axel Eggelink.
encrypted text:
The legibility of an encrypted message does not just depend on the complexity of the encryption algorithm, but also on the placement of the data of the message.
The Discreet Cosine Transform is a mathematical technique. In the case of the JPEG compression, a DCT is used to describe a finite set of patterns, called macroblocks, that could be described as the 64 character making up the JPEG image, adding lumo and chroma values as ‘intonation’.
If an image is compressed correctly, its macroblocks become ‘invisible’. The incidental trace of the macroblocks is generally ignored as artifact or error.
Keeping this in mind, I developed DCT. DCT uses the esthetics of JPEG macroblocks to mask its secret message as error. The encrypted message, hidden on the surface of the image is only legible by the ones in the know.
︎ A PDF about this work is downloadable here
︎ Visit the DCT ENCRYPTION STATION (2022, w/ Ted Davis) here
︎ DCT DECOY with Erik Axel Eggelink.