<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>http://en.zaoniao.it/index.php?action=history&amp;feed=atom&amp;title=Steganography_tools</id>
	<title>Steganography tools - Revision history</title>
	<link rel="self" type="application/atom+xml" href="http://en.zaoniao.it/index.php?action=history&amp;feed=atom&amp;title=Steganography_tools"/>
	<link rel="alternate" type="text/html" href="http://en.zaoniao.it/index.php?title=Steganography_tools&amp;action=history"/>
	<updated>2026-05-15T09:42:00Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.32.0</generator>
	<entry>
		<id>http://en.zaoniao.it/index.php?title=Steganography_tools&amp;diff=6971&amp;oldid=prev</id>
		<title>Admin: Created page with &quot;'''A steganography software tool''' allows a user to embed hidden data inside a carrier file, such as an image or video, and later extract that data.  It is not necessary to c...&quot;</title>
		<link rel="alternate" type="text/html" href="http://en.zaoniao.it/index.php?title=Steganography_tools&amp;diff=6971&amp;oldid=prev"/>
		<updated>2019-07-20T08:19:51Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;&amp;#039;&amp;#039;&amp;#039;A steganography software tool&amp;#039;&amp;#039;&amp;#039; allows a user to embed hidden data inside a carrier file, such as an image or video, and later extract that data.  It is not necessary to c...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;'''A steganography software tool''' allows a user to embed hidden data inside a carrier file, such as an image or video, and later extract that data.&lt;br /&gt;
&lt;br /&gt;
It is not necessary to conceal the message in the original file at all. Thus, it is not necessary to modify the original file and thus, it is difficult to detect anything. If a given section is subjected to successive bitwise manipulation to generate the cyphertext, then there is no evidence in the original file to show that it is being used to encrypt a file.&lt;br /&gt;
&lt;br /&gt;
==Architecture==&lt;br /&gt;
===Carrier===&lt;br /&gt;
The [[Steganography#Additional terminology|carrier]] is the signal, stream, or data file into which the hidden data is hidden by making subtle modifications. Examples include audio files, image files, documents, and executable files. In practice, the carrier should look and work the same as the original unmodified carrier, and should appear benign to anyone inspecting it.&lt;br /&gt;
&lt;br /&gt;
Certain properties can raise suspicion that a file is carrying hidden data:&lt;br /&gt;
* If the hidden data is large relative to the carrier content, as in an empty document that is a megabyte in size.&lt;br /&gt;
* The use of obsolete formats or poorly-supported extensions which break commonly used tools.&lt;br /&gt;
&lt;br /&gt;
It is a cryptographic requirement that the carrier (e.g. photo) is original, not a copy of something publicly available (e.g., downloaded). This is because the publicly available source data could be compared against the version with a hidden message embedded.&lt;br /&gt;
&lt;br /&gt;
There is a weaker requirement that the embedded message not change the carrier's statistics (or other metrics) such that the presence of a message is detectable. For instance, if the least-significant-bits of the red camera-pixel channel of an image has a Gaussian distribution given a constant colored field, simple image steganography which produces a random distribution of these bits could allow discrimination of stego images from unchanged ones.&lt;br /&gt;
&lt;br /&gt;
The sheer volume of modern (ca 2014) and inane high-bandwidth media (e.g., youtube.com, bittorrent sources. ebay, facebook, spam, etc.) provides ample opportunity for covert communication.&lt;br /&gt;
&lt;br /&gt;
===Chain===&lt;br /&gt;
&lt;br /&gt;
Hidden data may be split among a set of files, producing a ''carrier chain'', which has the property that all the carriers must be available, unmodified, and processed in the correct order in order to retrieve the hidden data. This additional security feature usually is achieved by:&lt;br /&gt;
* using a different [[initialization vector]] for each carrier and storing it inside processed carriers -&amp;amp;gt; ''CryptedIVn = Crypt( IVn, CryptedIVn-1 )''&lt;br /&gt;
* using a different cryptography algorithm for each carrier and choosing it with a chain-order-dependent [[Equiprobable|equiprobabilistic]] algorithm&lt;br /&gt;
&lt;br /&gt;
===Robustness and cryptography===&lt;br /&gt;
&lt;br /&gt;
Steganography tools aim to ensure robustness against modern [[Computer forensics|forensic methods]], such as statistical [[steganalysis]]. Such robustness may be achieved by a balanced mix of:&lt;br /&gt;
* a stream-based cryptography process;&lt;br /&gt;
* a [[Decorrelation|data whitening]] process;&lt;br /&gt;
* an [[Covering space|encoding]] process.&lt;br /&gt;
&lt;br /&gt;
If the data is detected, cryptography also helps to minimize the resulting damage, since the data is not exposed, only the fact that a secret was transmitted. The sender may be forced to decrypt the data once it is discovered, but [[deniable encryption]] can be leveraged to make the decrypted data appear benign.&lt;br /&gt;
&lt;br /&gt;
Strong steganography software relies on a [[Steganography#Data embedding security schemes|multi-layered architecture]] with a deep, documented [[obfuscation]] process.&lt;br /&gt;
&lt;br /&gt;
===Carrier engine===&lt;br /&gt;
&lt;br /&gt;
The carrier engine is the core of any steganography tool. Different file formats are modified in different ways, in order to covertly insert hidden data inside them. Processing algorithms include:&lt;br /&gt;
* Injection (suspicious because of the content-unrelated file size increment)&lt;br /&gt;
* Generation (suspicious because of the traceability of the generated carriers)&lt;br /&gt;
* [[Ancillary data]] and [[metadata]] substitution&lt;br /&gt;
* [[Least significant bit|LSB]] or adaptive substitution&lt;br /&gt;
* Frequency space manipulation&lt;br /&gt;
&lt;br /&gt;
==Tools comparison==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable sortable&amp;quot; style=&amp;quot;background:white;color:black;text-align:center&amp;quot;&lt;br /&gt;
|+ |'''Tools comparison (alphabetical order)'''&lt;br /&gt;
| style=&amp;quot;background:lightgrey&amp;quot; | '''Program'''&lt;br /&gt;
| style=&amp;quot;background:lightgrey&amp;quot; | '''Image files'''&lt;br /&gt;
| style=&amp;quot;background:lightgrey&amp;quot; | '''Audio files'''&lt;br /&gt;
| style=&amp;quot;background:lightgrey&amp;quot; | '''Video files'''&lt;br /&gt;
| style=&amp;quot;background:lightgrey&amp;quot; | '''Document files'''&lt;br /&gt;
| style=&amp;quot;background:lightgrey&amp;quot; | '''Other support'''&lt;br /&gt;
| style=&amp;quot;background:lightgrey&amp;quot; | '''Notes'''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:whitesmoke&amp;quot; | Anubis || ? || ? || ? || ? || ''Data being appended to the end of file'' || ''?''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:whitesmoke&amp;quot; | BMPSecrets || [[Windows bitmap|BMP]], [[JPG]], [[Tagged Image File Format|TIFF]], [[Graphics Interchange Format|GIF]]|| - || - || - || - || -&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:whitesmoke&amp;quot; | DarkCryptTC || [[Windows bitmap|BMP]], [[JPG]], [[Tagged Image File Format|TIFF]], [[Portable Network Graphics|PNG]], [[Adobe Photoshop|PSD]], [[Truevision TGA|TGA]], [[Multiple-image Network Graphics|MNG]] || [[WAV]] || - || [[Text file|TXT]], [[HTML]], [[XML]], [[OpenDocument|ODT]] || ''[[EXE]], [[Dynamic-link library|DLL]], [[NTFS]] streams'' || ''RSD mode (RNG-based random data distribution)''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:whitesmoke&amp;quot; | [http://jpinsoft.net/home.aspx DeepSound] || [[Windows bitmap|BMP]] || [[Compact Disc Digital Audio|Audio CD]], [[APE tag]], [[FLAC]], [[MP3]], [[WAV]], [[Windows Media Audio|WMA]] || - || - || - || ''AES 256-bit encryption''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:whitesmoke&amp;quot; | ImageSpyer G2 || [[Windows bitmap|BMP]], [[Tagged Image File Format|TIFF]] || - || - || - || - || ''RSD algorithm implemented, plugin for [[Total Commander]] (StegoTC G2)''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:whitesmoke&amp;quot; | [http://www.petitcolas.net/steganography/mp3stego/ MP3Stego] || - || [[MP3]] || - || - || - || ''Open source''&lt;br /&gt;
|-&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:whitesmoke&amp;quot; | [https://sergprogramz.pp.ua/en/mr-crypto-en Mr. Crypto] || [[Windows bitmap|BMP]], [[Portable Network Graphics|PNG]], [[Tagged Image File Format|TIFF]] || - || - || - || - || ''Freemium; interface on English, Russian and Ukrainian; AES and TripleDES encryption. Using [[Least_significant_bit#Least_significant_bit_in_digital_steganography|Least Significant Bit]] for data hiding.''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:whitesmoke&amp;quot; | [[OpenPuff]] || [[Windows bitmap|BMP]], [[JPEG]], [[Portable Network Graphics|PNG]], [[Truevision TGA|TGA]] || [[MP3]], [[WAV]] || [[3gp]], [[MP4]], [[MPEG-1]], [[MPEG-2]], [[VOB]], [[SWF]], [[FLV]] || [[Pdf]] || - || ''Freeware, 256-bit multi-encryption, Carrier chains, Multi-layered obfuscation''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:whitesmoke&amp;quot; | OpenStego || [[Windows bitmap|BMP]], [[Portable Network Graphics|PNG]] || - || - || - || - || ''Open source''&lt;br /&gt;
|-&lt;br /&gt;
|Outguess&lt;br /&gt;
|[[JPG]]&lt;br /&gt;
| -&lt;br /&gt;
| -&lt;br /&gt;
| -&lt;br /&gt;
| -&lt;br /&gt;
|Freeware for macOS&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:whitesmoke&amp;quot; | Outguess-rebirth || [[JPG]] || - || - || - || - || ''Portable freeware Windows (based on Outguess for Linux)''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:whitesmoke&amp;quot; | PHP-Class StreamSteganography || [[Portable Network Graphics|PNG]] || - || - || - || - || -&lt;br /&gt;
|-&lt;br /&gt;
|[http://quickcrypto.com/free-steganography-software.html QuickStego / QuickCrypto]&lt;br /&gt;
|[[Windows bitmap|BMP]], [[JPEG]], [[Graphics Interchange Format|GIF]]&lt;br /&gt;
| -&lt;br /&gt;
| -&lt;br /&gt;
| -&lt;br /&gt;
| -&lt;br /&gt;
|Windows XP, Vista, 7&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:whitesmoke&amp;quot; | Red JPEG || [[JPEG]] || - || - || - || - || ''XT for [[Total Commander]], LZMA compression, PRNG-based masking and distribution''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:whitesmoke&amp;quot; | S-Tools || [[Windows bitmap|BMP]], [[Graphics Interchange Format|GIF]] || [[Wav]] || - || - || ''Unused floppy disk space'' || -&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:whitesmoke&amp;quot; | Steg || [[Windows bitmap|BMP]], [[Portable Network Graphics|PNG]], [[JPEG]], [[Graphics Interchange Format|GIF]] || - || - || - || - || ''Symmetric and asymmetric key cryptography, runs on Win/Linux/Mac''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:whitesmoke&amp;quot; | StegaMail || [[Windows bitmap|BMP]], [[Portable Network Graphics|PNG]] || - || - || - || - || ''56bit encryption, zLib compression''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:whitesmoke&amp;quot; | Steganographic Laboratory (VSL) || [[Windows bitmap|BMP]], [[Portable Network Graphics|PNG]], [[JPG]], [[Tagged Image File Format|TIFF]] || - || - || - || - || ''Open source''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:whitesmoke&amp;quot; | Steganography Studio || [[Windows bitmap|BMP]], [[Portable Network Graphics|PNG]], [[Graphics Interchange Format|GIF]] || - || - || - || - || ''Different hiding methods (LSB, LSB Matching, SLSB), Open source''&lt;br /&gt;
|-&lt;br /&gt;
|[http://download.cnet.com/SteganPEG/3000-2193_4-75914262.html SteganPEG]&lt;br /&gt;
|[[JPEG]]&lt;br /&gt;
| -&lt;br /&gt;
| -&lt;br /&gt;
| -&lt;br /&gt;
| -&lt;br /&gt;
|Windows XP, Vista, 7&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:whitesmoke&amp;quot; | [[StegFS]] || - || - || - || - || ''[[Steganographic file system]] for [[Linux]]'' || -&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:whitesmoke&amp;quot; | Steghide || [[JPG]], [[Windows bitmap|BMP]] || [[WAV]], [[Au file format|AU]] || - || - || - || ''Open source (GNU General Public License)''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:whitesmoke&amp;quot; | [[StegoShare]] || [[Windows bitmap|BMP]], [[JPEG]], [[Portable Network Graphics|PNG]], [[Graphics Interchange Format|GIF]], [[Tagged Image File Format|TIFF]] || - || - || - || - || ''Open source''&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Source==&lt;br /&gt;
&lt;br /&gt;
[http://wikipedia.org/ http://wikipedia.org/]&lt;br /&gt;
&lt;br /&gt;
[[Category:Cryptography]]&lt;br /&gt;
[[Category:Software]]&lt;br /&gt;
[[Category:Data storage]]&lt;br /&gt;
==See Also on BitcoinWiki==&lt;br /&gt;
* [[Spiral Knights]]&lt;br /&gt;
* [[NetShade]]&lt;br /&gt;
* [[Yellowcoin]]&lt;/div&gt;</summary>
		<author><name>Admin</name></author>
		
	</entry>
</feed>