No there all jpeg images. I know that for a fact.
JPEG images start with either ÿØÿá or ÿØÿÛ when you look at them in a hex editor or notepad.
And jpeg's also contain the numbers 456789 fallowed by a bunch of letters in the alphabet near the start of the coding also.
These two characteristics aren't found in other file formats..
And if you look at each of those brawl images. They all have a starting point of either of ÿØÿá or ÿØÿÛ.. (Assuming youve removed the right amount of random bytes from the start.
Yes, the 456789 is part of the quantization table, I think. One possible thing I found is that maybe the Wii process is "optimizing" out certain bytes. I also noticed the weird 00's getting insert at places (like ff00d8 instead of ffd8), sometimes. But if you search through the files (yay HxD) for FFC0, which is like an information section, only a couple of the images have it. ...BUT, the other images still have a basically identical section, starting with just C0. You can tell it's the same because it has the 640x480 width in it (hex 280 by 1E0). So I'm wondering if there's a way to insert tags and figure out which data got added.
Edit:
0x61 (a) - 0x30 (0) = 0d49
49 + 490 = 539
Holizz, what were the numbers relating to? I didn't follow that part. =P
And what exactly did you do...make an image solely on the computer, and copy it to a Wii? Or copy someone else's bin onto the Wii?
I don't think it's the first chunk that's the problem. I'm pretty confident those three weren't quite decrypted right.
The encryption is basic, simple AES using a key. Unless there's another way to do AES, or more information is required, I imagine they're decrypted correctly, since AES and such are designed such that even a small key/decryption problem results in a totally different file. (anyone who knows AES better, feel free to correct me on that). And I kind of feel like the others were decrypted correctly since they have so much similar data...unless it's really a fluke. I highly doubt Nintendo would do a custom decryption algorithm if other people have been able to use normal AES on other parts.
I'd like to have some more screenshots to play with and look for certain patterns, besides removing the first bytes.
I agree...it might be helpful to have some more pictures. The ones with smaller filesizes seem especially strange. Thanks for the work, guys!