A steganography software tool implements a subset of the most general digital steganography process, allowing users to insert and extract hidden data into and from carrier files.
Contents |
Novel users approaching steganography need to get acquainted with some common steganography-related terms and concepts
Data to be covertly communicated are usually referred to as hidden data. Steganography focuses on the covertly adjective. You're going to employ a steganography tool because the very existence of the data has to be secret and invisible. The tool can also perform some cryptography on the hidden data, but remember it is optional: data has to be invisible first.
Please notice also that, according to common public opinion:
The carrier is the signal, stream, or data file into which the payload is hidden.
Take also a look to this practical definition of carrier:
From a user point of view:
When hidden data is split among a set of files you get a carrier chain.
Carrier chains are a main feature of every professional steganography tool, ensuring that you can't get the hidden data back:
This additional security feature is usually achieved by:
Users have to remember that steganography's main goal is invisibility. A good steganography tool should first ensure robustness against modern forensic methods, like statistical steganalysis. Strong cryptography, along with any other obfuscation process, is always welcome but should only be considered as a last-man-standing defense. Encoding (steganography) will deceive attackers and obfuscation (cryptography) will slow them down once you've been caught. People hiding sensitive data should consider deniable cryptography as an exit strategy.
Robustness against statistical steganalysis can be achieved by a balanced mix of:
Steganography users should rely only on multi-layered architectures with a deep documented obfuscation process.
The carrier engine is the core of any steganography tool. Different file formats are modified in different ways, in order to covertly insert hidden data inside them. Among these processing algorithms you can find:
Program | Image files | Audio files | Video files | Document files | Other support | Notes |
OpenPuff | BMP, JPG, PNG, TGA | Mp3, WAV | 3gp, Mp4, MPEG-1, MPEG-2, VOB, SWF, FLV | - | Carrier chains, Multi-layered obfuscation | |
Red JPEG | JPG | - | - | - | - | XT for Total Commander, LZMA compression, PRNG-based masking and distribution |
DarkCryptTC | BMP, JPG, TIFF, PNG, PSD, TGA, MNG | WAV | - | TXT, HTML, XML, ODT | EXE, DLL, NTFS streams | RSD mode (RNG-based random data distribution) |
MP3Stego | - | Mp3 | - | - | - | - |
OpenStego | BMP, PNG | - | - | - | - | - |
S-Tools | BMP, GIF | Wav | - | - | Unused floppy disk space | - |
StegFS | - | - | - | - | Steganographic file system for Linux | - |
Steganographic Laboratory (VSL) | BMP, PNG, JPG, TIFF | - | - | - | - | - |
PHP-Class StreamSteganography | PNG | - | - | - | - | - |
Steganography Studio | ? | ? | ? | ? | ? | ? |
Anubis | ? | ? | ? | ? | ? | ? |