Invisible Secrets
Parchivist (Talk | contribs) (Created page with "{{FormatInfo |formattype=electronic |subcat=Encryption |subcat2=Steganography }} '''Invisible Secrets''' by East-Tec (formerly NeoByte Solutions) is a Win32 steganography pro...") |
Parchivist (Talk | contribs) |
||
(3 intermediate revisions by one user not shown) | |||
Line 3: | Line 3: | ||
|subcat=Encryption | |subcat=Encryption | ||
|subcat2=Steganography | |subcat2=Steganography | ||
+ | |extensions={{ext|isc}},{{ext|exe}},{{ext|locked}} | ||
}} | }} | ||
− | '''Invisible Secrets''' by East-Tec (formerly NeoByte Solutions) is a Win32 steganography program that hides data in [[JPEG]], [[PNG]], [[BMP]], [[HTML]] and [[WAV]] files. | + | '''Invisible Secrets''' by East-Tec (formerly NeoByte Solutions) is a Win32 encryption and steganography program that hides data in [[JPEG]], [[PNG]], [[BMP]], [[HTML]] and [[WAV]] files. |
− | + | Supports strong encryption ([[Blowfish]], Twofish, RC4, [[AES]], Cast128, GOST, Diamond 2, Sapphire II) | |
− | BMP and WAV - uses a 1-bit LSB method | + | Files can optionally be compressed before encryption or steganography |
+ | |||
+ | It can create self-decrypting files | ||
+ | |||
+ | Encrypted files can either be saved in-place or as an .isc file | ||
+ | |||
+ | When 'password-protecting' a program, it encrypts it and renames it with a .locked extension (sample.exe becomes sample.exe.locked), requiring it to be launched from within Invisible Secrets | ||
+ | |||
+ | PNG and JPEG - the hidden data is placed in the comment field of these file image types (which is located at the beginning of the file for JPEG, at the end for PNG) | ||
+ | |||
+ | BMP, DIB and WAV - uses a 1-bit LSB method | ||
HTML - uses spaces / tab (0/1) added at the end of the lines | HTML - uses spaces / tab (0/1) added at the end of the lines | ||
Line 18: | Line 29: | ||
== Links == | == Links == | ||
* [https://www.east-tec.com/invisiblesecrets/ Homepage] | * [https://www.east-tec.com/invisiblesecrets/ Homepage] | ||
+ | * [https://web.archive.org/web/20030803124458/http://invisiblesecrets.com/ Archived Invisible Secrets v4 homepage] | ||
+ | * [https://web.archive.org/web/20051102030807/http://www.neobytesolutions.com:80/affiliates/invsecr-aff50094.exe Invisible Secrets v4.3 download] | ||
+ | * [https://web.archive.org/web/20030410101031/http://66.54.199.206/downloads/invsecr.exe Invisible Secrets v4.0.2 download] | ||
+ | * [https://archive.org/download/tucows_209725_Invisible_Secrets/invsecr.exe Invisible Secrets v4.0 download] | ||
* [https://web.archive.org/web/20030210184341/http://www.neobytesolutions.com/invsecr/index.html Archived Invisible Secrets 2002 v3.2 homepage] | * [https://web.archive.org/web/20030210184341/http://www.neobytesolutions.com/invsecr/index.html Archived Invisible Secrets 2002 v3.2 homepage] | ||
* [https://web.archive.org/web/20030103041951/http://216.40.243.191/downloads/trial/invsecr/invsecr.exe Invisible Secrets 2002 v3.2 download] | * [https://web.archive.org/web/20030103041951/http://216.40.243.191/downloads/trial/invsecr/invsecr.exe Invisible Secrets 2002 v3.2 download] | ||
− | * [https://web.archive.org/web/ | + | * [https://web.archive.org/web/20040609122255/http://66.54.199.206/downloads/inv2/invsecr2.exe Invisible Secrets v2.1 download] |
− | + | ||
* [http://www.guillermito2.net/stegano/invisiblesecrets/index.html Analysis of weaknesses and 'Invisible Secrets 2002 Hidden Data Finder' utility] | * [http://www.guillermito2.net/stegano/invisiblesecrets/index.html Analysis of weaknesses and 'Invisible Secrets 2002 Hidden Data Finder' utility] |
Latest revision as of 00:40, 21 October 2023
Invisible Secrets by East-Tec (formerly NeoByte Solutions) is a Win32 encryption and steganography program that hides data in JPEG, PNG, BMP, HTML and WAV files.
Supports strong encryption (Blowfish, Twofish, RC4, AES, Cast128, GOST, Diamond 2, Sapphire II)
Files can optionally be compressed before encryption or steganography
It can create self-decrypting files
Encrypted files can either be saved in-place or as an .isc file
When 'password-protecting' a program, it encrypts it and renames it with a .locked extension (sample.exe becomes sample.exe.locked), requiring it to be launched from within Invisible Secrets
PNG and JPEG - the hidden data is placed in the comment field of these file image types (which is located at the beginning of the file for JPEG, at the end for PNG)
BMP, DIB and WAV - uses a 1-bit LSB method
HTML - uses spaces / tab (0/1) added at the end of the lines
In Invisible Secrets 2002 3.2, the LSBs of BMP images not used by the hidden data are all set to 1 or 0, which makes it blatantly obvious that something is hiding. This has supposedly been fixed in v4.
[edit] Links
- Homepage
- Archived Invisible Secrets v4 homepage
- Invisible Secrets v4.3 download
- Invisible Secrets v4.0.2 download
- Invisible Secrets v4.0 download
- Archived Invisible Secrets 2002 v3.2 homepage
- Invisible Secrets 2002 v3.2 download
- Invisible Secrets v2.1 download
- Analysis of weaknesses and 'Invisible Secrets 2002 Hidden Data Finder' utility