<?xml version="1.0"?>
<?xml-stylesheet type="text/css" href="http://fileformats.archiveteam.org/skins/common/feed.css?303"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>http://fileformats.archiveteam.org/index.php?action=history&amp;feed=atom&amp;title=JSteg</id>
		<title>JSteg - Revision history</title>
		<link rel="self" type="application/atom+xml" href="http://fileformats.archiveteam.org/index.php?action=history&amp;feed=atom&amp;title=JSteg"/>
		<link rel="alternate" type="text/html" href="http://fileformats.archiveteam.org/index.php?title=JSteg&amp;action=history"/>
		<updated>2026-04-12T05:02:45Z</updated>
		<subtitle>Revision history for this page on the wiki</subtitle>
		<generator>MediaWiki 1.19.2</generator>

	<entry>
		<id>http://fileformats.archiveteam.org/index.php?title=JSteg&amp;diff=46045&amp;oldid=prev</id>
		<title>Parchivist at 02:57, 29 October 2023</title>
		<link rel="alternate" type="text/html" href="http://fileformats.archiveteam.org/index.php?title=JSteg&amp;diff=46045&amp;oldid=prev"/>
				<updated>2023-10-29T02:57:52Z</updated>
		
		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;table class='diff diff-contentalign-left'&gt;
				&lt;col class='diff-marker' /&gt;
				&lt;col class='diff-content' /&gt;
				&lt;col class='diff-marker' /&gt;
				&lt;col class='diff-content' /&gt;
			&lt;tr valign='top'&gt;
			&lt;td colspan='2' style=&quot;background-color: white; color:black;&quot;&gt;← Older revision&lt;/td&gt;
			&lt;td colspan='2' style=&quot;background-color: white; color:black;&quot;&gt;Revision as of 02:57, 29 October 2023&lt;/td&gt;
			&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 20:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 20:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;* [https://dl.packetstormsecurity.net/crypt/stego/DOS/jsteg.zip JSteg DOS version]&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;* [https://dl.packetstormsecurity.net/crypt/stego/DOS/jsteg.zip JSteg DOS version]&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;* [https://dl.packetstormsecurity.net/crypt/stego/DOS/jsteg.txt JSteg DOS readme]&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;* [https://dl.packetstormsecurity.net/crypt/stego/DOS/jsteg.txt JSteg DOS readme]&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;background: #ffa; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;* [http://www.nic.funet.fi/pub/crypt/steganography/jpeg-jsteg-v4.diff.gz Context diffs to convert a standard v4 JPEG source tree into a JSteg source tree] ([http://www.nic.funet.fi/pub/crypt/steganography/jpeg-v4.tar.gz v4 JPEG source])&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;background: #cfc; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;* [http://www.nic.funet.fi/pub/crypt/steganography/jpeg-jsteg-v4.diff.gz Context diffs to convert a standard v4 JPEG source tree into a JSteg source tree] ([http://www.nic.funet.fi/pub/crypt/steganography/jpeg-v4.tar.gz v4 JPEG source&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;]) ([https://zooid.org/~paul/crypto/jsteg/ mirror&lt;/ins&gt;])&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;* [http://www.nic.funet.fi/pub/crypt/steganography/jpeg.announcement.gz JSteg Announcement]&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;* [http://www.nic.funet.fi/pub/crypt/steganography/jpeg.announcement.gz JSteg Announcement]&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;* [https://www.provos.org/p/detection-with-stegdetect/ Detected by Stegdetect and attacked by Stegbreak]&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;* [https://www.provos.org/p/detection-with-stegdetect/ Detected by Stegdetect and attacked by Stegbreak]&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 26:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 26:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;* [https://farid.berkeley.edu/downloads/publications/icip02.pdf Detecting Hidden Messages Using Higher-Order Statistical Models]&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;* [https://farid.berkeley.edu/downloads/publications/icip02.pdf Detecting Hidden Messages Using Higher-Order Statistical Models]&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;* [https://doi.org/10.1145/952532.952595 A fast and effective steganalytic technique against JSteg-like algorithms]&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;* [https://doi.org/10.1145/952532.952595 A fast and effective steganalytic technique against JSteg-like algorithms]&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&amp;#160;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;background: #cfc; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;color: red; font-weight: bold; text-decoration: none;&quot;&gt;* [https://web.archive.org/web/20110812211717/http://csis.bits-pilani.ac.in/faculty/murali/netsec-09/seminar/refs/anuroopsrep.pdf JSteg: Steganography and Steganalysis]&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&amp;#160;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;background: #cfc; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;color: red; font-weight: bold; text-decoration: none;&quot;&gt;* [https://github.com/mmtechnodrone/SSAK SSAK] - GUI front end for file identification, data carving, hexdump and steganography programs that includes JSteg&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>Parchivist</name></author>	</entry>

	<entry>
		<id>http://fileformats.archiveteam.org/index.php?title=JSteg&amp;diff=46044&amp;oldid=prev</id>
		<title>Parchivist: Created page with &quot;{{FormatInfo |formattype=electronic |subcat=Encryption |subcat2=Steganography |released=1993 }}  '''JSteg''' by Derek Upham is perhaps the first true steganography program for...&quot;</title>
		<link rel="alternate" type="text/html" href="http://fileformats.archiveteam.org/index.php?title=JSteg&amp;diff=46044&amp;oldid=prev"/>
				<updated>2023-10-29T02:46:20Z</updated>
		
		<summary type="html">&lt;p&gt;Created page with &amp;quot;{{FormatInfo |formattype=electronic |subcat=Encryption |subcat2=Steganography |released=1993 }}  &amp;#039;&amp;#039;&amp;#039;JSteg&amp;#039;&amp;#039;&amp;#039; by Derek Upham is perhaps the first true steganography program for...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;{{FormatInfo&lt;br /&gt;
|formattype=electronic&lt;br /&gt;
|subcat=Encryption&lt;br /&gt;
|subcat2=Steganography&lt;br /&gt;
|released=1993&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
'''JSteg''' by Derek Upham is perhaps the first true steganography program for [[JPG]].&lt;br /&gt;
&lt;br /&gt;
Preston Wilson and Randall Williams ported it to DOS&lt;br /&gt;
&lt;br /&gt;
'''JSteg Shell''' by korejwa is a port to Win9x and includes certain tweaks like (optionally) including the filename and optional encryption (RC4-40). It also includes a built-in dictionary attack tool.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;br /&gt;
* [http://www.guillermito2.net/stegano/jsteg/index.html Analysis of format and JSteg_Data_Extractor]&lt;br /&gt;
* [https://web.archive.org/web/20020402223953/http://www.tiac.net/users/korejwa/jsteg.htm JSteg Shell 2.0 homepage (archived)]&lt;br /&gt;
* [https://web.archive.org/web/19991117021553/http://www.tiac.net:80/users/korejwa/JStegShell10a.zip JSteg Shell 1.0A] ([https://archive.org/download/VB4RUN32_EXE/VB4RUN32.EXE VB4 runtimes])&lt;br /&gt;
* [https://dl.packetstormsecurity.net/crypt/stego/DOS/jsteg.zip JSteg DOS version]&lt;br /&gt;
* [https://dl.packetstormsecurity.net/crypt/stego/DOS/jsteg.txt JSteg DOS readme]&lt;br /&gt;
* [http://www.nic.funet.fi/pub/crypt/steganography/jpeg-jsteg-v4.diff.gz Context diffs to convert a standard v4 JPEG source tree into a JSteg source tree] ([http://www.nic.funet.fi/pub/crypt/steganography/jpeg-v4.tar.gz v4 JPEG source])&lt;br /&gt;
* [http://www.nic.funet.fi/pub/crypt/steganography/jpeg.announcement.gz JSteg Announcement]&lt;br /&gt;
* [https://www.provos.org/p/detection-with-stegdetect/ Detected by Stegdetect and attacked by Stegbreak]&lt;br /&gt;
* [https://farid.berkeley.edu/downloads/publications/tr01.pdf Detecting Steganographic Messages in Digital Images] ([https://farid.berkeley.edu/downloads/code/steg.m Matlab source])&lt;br /&gt;
* [https://farid.berkeley.edu/downloads/publications/icip02.pdf Detecting Hidden Messages Using Higher-Order Statistical Models]&lt;br /&gt;
* [https://doi.org/10.1145/952532.952595 A fast and effective steganalytic technique against JSteg-like algorithms]&lt;/div&gt;</summary>
		<author><name>Parchivist</name></author>	</entry>

	</feed>