JPHS (JPHide/JPSeek)

From Just Solve the File Format Problem
(Difference between revisions)
Jump to: navigation, search
Line 21: Line 21:
 
* [https://www.provos.org/p/detection-with-stegdetect/ Stegdetect] - finds JPHS files
 
* [https://www.provos.org/p/detection-with-stegdetect/ Stegdetect] - finds JPHS files
 
* [https://sourceforge.net/projects/ben4dstegdetect/ Ben-4D Steganalysis Software] - detects JPHSWin files
 
* [https://sourceforge.net/projects/ben4dstegdetect/ Ben-4D Steganalysis Software] - detects JPHSWin files
 +
* [http://www.spy-hunter.com/stegspy Detected by StegSpy]
 
* [http://eprints.bournemouth.ac.uk/24621/1/NATO%20SPI13%281%29.pdf Study of how well JPHS evades detection]
 
* [http://eprints.bournemouth.ac.uk/24621/1/NATO%20SPI13%281%29.pdf Study of how well JPHS evades detection]
 
* [https://github.com/mmtechnodrone/SSAK SSAK] - GUI front end for file identification, data carving, hexdump and steganography programs that includes JPHS
 
* [https://github.com/mmtechnodrone/SSAK SSAK] - GUI front end for file identification, data carving, hexdump and steganography programs that includes JPHS
 
* [https://github.com/DominicBreuker/stego-toolkit Steganography Toolkit] - Docker image with a bunch of steganography tools including JPHS
 
* [https://github.com/DominicBreuker/stego-toolkit Steganography Toolkit] - Docker image with a bunch of steganography tools including JPHS

Revision as of 09:18, 30 August 2023

File Format
Name JPHS (JPHide/JPSeek)
Ontology

JPHS (JPHide, JPSeek, JPHSWin) by Allan Latham is a steganography program that hides information in JPEG files with password protection.

Source code and versions for DOS, Windows and Linux are available.

The design objective was not simply to hide a file but rather to do this in such a way that it is impossible to prove that the host file contains a hidden file. Given a typical visual image, a low insertion rate (under 5%) and the absence of the original file, it is not possible to conclude with any worthwhile certainty that the host file contains inserted data. Above 15% the effects begin to become visible to the naked eye. Of course some images are much better than others when used a host file - plenty of fine detail is good. A cloudless blue sky over a snow covered ski paradise is bad. A waterfall in a forest is probably ideal.

There are reports that the original one crashed all the time. If that happens to you, try the version from SSAK or Steganography Toolkit.


Links

Personal tools
Namespaces

Variants
Actions
Navigation
Toolbox