Invisible Secrets

From Just Solve the File Format Problem
(Difference between revisions)
Jump to: navigation, search
 
(2 intermediate revisions by one user not shown)
Line 3: Line 3:
 
|subcat=Encryption
 
|subcat=Encryption
 
|subcat2=Steganography
 
|subcat2=Steganography
 +
|extensions={{ext|isc}},{{ext|exe}},{{ext|locked}}
 
}}
 
}}
  
'''Invisible Secrets''' by East-Tec (formerly NeoByte Solutions) is a Win32 steganography program that hides data in [[JPEG]], [[PNG]], [[BMP]], [[HTML]] and [[WAV]] files.
+
'''Invisible Secrets''' by East-Tec (formerly NeoByte Solutions) is a Win32 encryption and steganography program that hides data in [[JPEG]], [[PNG]], [[BMP]], [[HTML]] and [[WAV]] files.
  
Supports strong encryption (Blowfish, Twofish, RC4, AES, etc)
+
Supports strong encryption ([[Blowfish]], Twofish, RC4, [[AES]], Cast128, GOST, Diamond 2, Sapphire II)
 +
 
 +
Files can optionally be compressed before encryption or steganography
 +
 
 +
It can create self-decrypting files
 +
 
 +
Encrypted files can either be saved in-place or as an .isc file
 +
 
 +
When 'password-protecting' a program, it encrypts it and renames it with a .locked extension (sample.exe becomes sample.exe.locked), requiring it to be launched from within Invisible Secrets
  
 
PNG and JPEG - the hidden data is placed in the comment field of these file image types (which is located at the beginning of the file for JPEG, at the end for PNG)
 
PNG and JPEG - the hidden data is placed in the comment field of these file image types (which is located at the beginning of the file for JPEG, at the end for PNG)
  
BMP and WAV - uses a 1-bit LSB method
+
BMP, DIB and WAV - uses a 1-bit LSB method
  
 
HTML - uses spaces / tab (0/1) added at the end of the lines
 
HTML - uses spaces / tab (0/1) added at the end of the lines
Line 21: Line 30:
 
* [https://www.east-tec.com/invisiblesecrets/ Homepage]
 
* [https://www.east-tec.com/invisiblesecrets/ Homepage]
 
* [https://web.archive.org/web/20030803124458/http://invisiblesecrets.com/ Archived Invisible Secrets v4 homepage]
 
* [https://web.archive.org/web/20030803124458/http://invisiblesecrets.com/ Archived Invisible Secrets v4 homepage]
* [https://archive.org/download/tucows_209725_Invisible_Secrets/invsecr.exe Invisible Secrets v4 download]
+
* [https://web.archive.org/web/20051102030807/http://www.neobytesolutions.com:80/affiliates/invsecr-aff50094.exe Invisible Secrets v4.3 download]
 +
* [https://web.archive.org/web/20030410101031/http://66.54.199.206/downloads/invsecr.exe Invisible Secrets v4.0.2 download]
 +
* [https://archive.org/download/tucows_209725_Invisible_Secrets/invsecr.exe Invisible Secrets v4.0 download]
 
* [https://web.archive.org/web/20030210184341/http://www.neobytesolutions.com/invsecr/index.html Archived Invisible Secrets 2002 v3.2 homepage]
 
* [https://web.archive.org/web/20030210184341/http://www.neobytesolutions.com/invsecr/index.html Archived Invisible Secrets 2002 v3.2 homepage]
 
* [https://web.archive.org/web/20030103041951/http://216.40.243.191/downloads/trial/invsecr/invsecr.exe Invisible Secrets 2002 v3.2 download]
 
* [https://web.archive.org/web/20030103041951/http://216.40.243.191/downloads/trial/invsecr/invsecr.exe Invisible Secrets 2002 v3.2 download]
 
* [https://web.archive.org/web/20040609122255/http://66.54.199.206/downloads/inv2/invsecr2.exe Invisible Secrets v2.1 download]
 
* [https://web.archive.org/web/20040609122255/http://66.54.199.206/downloads/inv2/invsecr2.exe Invisible Secrets v2.1 download]
 
* [http://www.guillermito2.net/stegano/invisiblesecrets/index.html Analysis of weaknesses and 'Invisible Secrets 2002 Hidden Data Finder' utility]
 
* [http://www.guillermito2.net/stegano/invisiblesecrets/index.html Analysis of weaknesses and 'Invisible Secrets 2002 Hidden Data Finder' utility]

Latest revision as of 00:40, 21 October 2023

File Format
Name Invisible Secrets
Ontology
Extension(s) .isc,.exe,.locked

Invisible Secrets by East-Tec (formerly NeoByte Solutions) is a Win32 encryption and steganography program that hides data in JPEG, PNG, BMP, HTML and WAV files.

Supports strong encryption (Blowfish, Twofish, RC4, AES, Cast128, GOST, Diamond 2, Sapphire II)

Files can optionally be compressed before encryption or steganography

It can create self-decrypting files

Encrypted files can either be saved in-place or as an .isc file

When 'password-protecting' a program, it encrypts it and renames it with a .locked extension (sample.exe becomes sample.exe.locked), requiring it to be launched from within Invisible Secrets

PNG and JPEG - the hidden data is placed in the comment field of these file image types (which is located at the beginning of the file for JPEG, at the end for PNG)

BMP, DIB and WAV - uses a 1-bit LSB method

HTML - uses spaces / tab (0/1) added at the end of the lines

In Invisible Secrets 2002 3.2, the LSBs of BMP images not used by the hidden data are all set to 1 or 0, which makes it blatantly obvious that something is hiding. This has supposedly been fixed in v4.


[edit] Links

Personal tools
Namespaces

Variants
Actions
Navigation
Toolbox