Steganography tools

A steganography software tool implements a subset of the most general digital steganography process, allowing users to insert and extract hidden data into and from carrier files.

Contents

Architecture

Novel users approaching steganography need to get acquainted with some common steganography-related terms and concepts

Hidden data

Data to be covertly communicated are usually referred to as hidden data. Steganography focuses on the covertly adjective. You're going to employ a steganography tool because the very existence of the data has to be secret and invisible. The tool can also perform some cryptography on the hidden data, but remember it is optional: data has to be invisible first.

Please notice also that, according to common public opinion:

Carrier

The carrier is the signal, stream, or data file into which the payload is hidden.

Take also a look to this practical definition of carrier:

From a user point of view:

Chain

When hidden data is split among a set of files you get a carrier chain.

Carrier chains are a main feature of every professional steganography tool, ensuring that you can't get the hidden data back:

This additional security feature is usually achieved by:

Cryptography

Users have to remember that steganography's main goal is invisibility. A good steganography tool should first ensure robustness against modern forensic methods, like statistical steganalysis. Strong cryptography, along with any other obfuscation process, is always welcome but should only be considered as a last-man-standing defense. Encoding (steganography) will deceive attackers and obfuscation (cryptography) will slow them down once you've been caught. People hiding sensitive data should consider deniable cryptography as an exit strategy.

Robustness against statistical steganalysis can be achieved by a balanced mix of:

Steganography users should rely only on multi-layered architectures with a deep documented obfuscation process.

Carrier engine

The carrier engine is the core of any steganography tool. Different file formats are modified in different ways, in order to covertly insert hidden data inside them. Among these processing algorithms you can find:

Manufacturer comparison
Program Image files Audio files Video files Document files Other support Notes
OpenPuff BMP, JPG, PNG, TGA Mp3, WAV 3gp, Mp4, MPEG-1, MPEG-2, VOB, SWF, FLV Pdf - Carrier chains, Multi-layered obfuscation
Red JPEG JPG - - - - XT for Total Commander, LZMA compression, PRNG-based masking and distribution
DarkCryptTC BMP, JPG, TIFF, PNG, PSD, TGA, MNG WAV - TXT, HTML, XML, ODT EXE, DLL, NTFS streams RSD mode (RNG-based random data distribution)
MP3Stego - Mp3 - - - -
OpenStego BMP, PNG - - - - -
S-Tools BMP, GIF Wav - - Unused floppy disk space -
StegFS - - - - Steganographic file system for Linux -
Steganographic Laboratory (VSL) BMP, PNG, JPG, TIFF - - - - -
PHP-Class StreamSteganography PNG - - - - -
Steganography Studio  ?  ?  ?  ?  ?  ?
Anubis  ?  ?  ?  ?  ?  ?

See also

External links

Steganography tools directories

Articles

Workshops