Steganography
From Just Solve the File Format Problem
(Difference between revisions)
Parchivist (Talk | contribs) |
Parchivist (Talk | contribs) |
||
Line 7: | Line 7: | ||
== Formats == | == Formats == | ||
For a list of formats, see [[Encryption#Steganography]]. | For a list of formats, see [[Encryption#Steganography]]. | ||
+ | |||
== Detection == | == Detection == | ||
* [https://sourceforge.net/projects/ben4dstegdetect/ Ben-4D Steganalysis Software] - Detects [[JPHS (JPHide/JPSeek)]], LSB, Invisible Secrets v4.0, Fuse, [[Camouflage|Camouflage v1.2.1]] | * [https://sourceforge.net/projects/ben4dstegdetect/ Ben-4D Steganalysis Software] - Detects [[JPHS (JPHide/JPSeek)]], LSB, Invisible Secrets v4.0, Fuse, [[Camouflage|Camouflage v1.2.1]] | ||
− | * [https://www.provos.org/p/detection-with-stegdetect/ Stegdetect] - Detects jsteg, [[JPHS (JPHide/JPSeek)]], invisible secrets, | + | * [https://www.provos.org/p/detection-with-stegdetect/ Stegdetect] - Detects jsteg, [[JPHS (JPHide/JPSeek)]], invisible secrets, [[OutGuess|OutGuess 01.3b]], F5 (header analysis), appendX and [[Camouflage]] |
* [http://www.spy-hunter.com/stegspy StegSpy] - Detects [[JPHS (JPHide/JPSeek)]], Hiderman, Masker, [[JPegX]], Invisible Secrets | * [http://www.spy-hunter.com/stegspy StegSpy] - Detects [[JPHS (JPHide/JPSeek)]], Hiderman, Masker, [[JPegX]], Invisible Secrets | ||
* [https://farid.berkeley.edu/ Steganalysis papers by Hany Farid] | * [https://farid.berkeley.edu/ Steganalysis papers by Hany Farid] | ||
Line 16: | Line 17: | ||
*** [https://farid.berkeley.edu/downloads/code/steg.m Matlab source code] | *** [https://farid.berkeley.edu/downloads/code/steg.m Matlab source code] | ||
** [https://farid.berkeley.edu/downloads/publications/icip02.pdf Detecting Hidden Messages Using Higher-Order Statistical Models] - Jsteg, EZStego, [[OutGuess]] | ** [https://farid.berkeley.edu/downloads/publications/icip02.pdf Detecting Hidden Messages Using Higher-Order Statistical Models] - Jsteg, EZStego, [[OutGuess]] | ||
+ | |||
+ | |||
+ | == Cracking == | ||
+ | * [https://www.provos.org/p/detection-with-stegdetect/ StegBreak] (included with Stegdetect) - dictionary attacks against JSteg-Shell, [[JPHS (JPHide/JPSeek)]] and [[OutGuess|OutGuess 01.3b]] | ||
+ | * [https://github.com/RickdeJager/stegseek Stegseek] - dictionary attacks against steghide | ||
+ | * [https://github.com/Paradoxis/StegCracker StegCracker] - dictionary attacks against steghide | ||
+ | * [https://github.com/R4yGM/stegbrute StegBrute] - dictionary attacks against steghide | ||
Revision as of 15:15, 30 August 2023
Steganography is a class of encryption in which the very fact that information exists is obscured. For example, an innocent-looking PNG image could contain a secret message encoded in its seemingly-random least-significant bits. Assuming the algorithm is sufficiently secure, it would be impossible to know whether the message exists or not, unless you know the secret key.
Contents |
Formats
For a list of formats, see Encryption#Steganography.
Detection
- Ben-4D Steganalysis Software - Detects JPHS (JPHide/JPSeek), LSB, Invisible Secrets v4.0, Fuse, Camouflage v1.2.1
- Stegdetect - Detects jsteg, JPHS (JPHide/JPSeek), invisible secrets, OutGuess 01.3b, F5 (header analysis), appendX and Camouflage
- StegSpy - Detects JPHS (JPHide/JPSeek), Hiderman, Masker, JPegX, Invisible Secrets
- Steganalysis papers by Hany Farid
- Detecting Steganographic Messages in Digital Images - Jsteg, EZStego, OutGuess
- Detecting Hidden Messages Using Higher-Order Statistical Models - Jsteg, EZStego, OutGuess
Cracking
- StegBreak (included with Stegdetect) - dictionary attacks against JSteg-Shell, JPHS (JPHide/JPSeek) and OutGuess 01.3b
- Stegseek - dictionary attacks against steghide
- StegCracker - dictionary attacks against steghide
- StegBrute - dictionary attacks against steghide