Steganography
From Just Solve the File Format Problem
(Difference between revisions)
Parchivist (Talk | contribs) |
Parchivist (Talk | contribs) |
||
Line 30: | Line 30: | ||
== See also == | == See also == | ||
* [[Digital watermark]] | * [[Digital watermark]] | ||
+ | * [[Data Hiding/Embedding]] | ||
Revision as of 17:00, 31 August 2023
Steganography is a class of encryption in which the very fact that information exists is obscured. For example, an innocent-looking PNG image could contain a secret message encoded in its seemingly-random least-significant bits. Assuming the algorithm is sufficiently secure, it would be impossible to know whether the message exists or not, unless you know the secret key.
Contents |
Formats
For a list of formats, see Encryption#Steganography.
Detection
- Aletheia - Detects F5, Steghide, LSB replacement, LSB matching and some kind of adaptive schemes
- Ben-4D Steganalysis Software - Detects JPHS (JPHide/JPSeek), LSB, Invisible Secrets v4.0, Fuse, Camouflage v1.2.1
- Stegdetect - Detects jsteg, JPHS (JPHide/JPSeek), invisible secrets, OutGuess 01.3b, F5 (header analysis), appendX and Camouflage
- StegSpy - Detects JPHS (JPHide/JPSeek), Hiderman, Masker, JPegX, Invisible Secrets
- Steganalysis papers by Hany Farid
- Detecting Steganographic Messages in Digital Images - Jsteg, EZStego, OutGuess
- Detecting Hidden Messages Using Higher-Order Statistical Models - Jsteg, EZStego, OutGuess
Cracking
- Aletheia - dictionary attacks on steghide, OutGuess, OpenStego
- StegBreak (included with Stegdetect) - dictionary attacks against JSteg-Shell, JPHS (JPHide/JPSeek) and OutGuess 01.3b
- Stegseek - dictionary attacks against steghide
- StegCracker - dictionary attacks against steghide
- StegBrute - dictionary attacks against steghide
See also