Steganography

From Just Solve the File Format Problem
(Difference between revisions)
Jump to: navigation, search
m
Line 11: Line 11:
 
* [https://www.provos.org/p/detection-with-stegdetect/ Stegdetect] - Detects jsteg, [[JPHS (JPHide/JPSeek)]], invisible secrets, outguess 01.3b, F5 (header analysis), appendX and camouflage
 
* [https://www.provos.org/p/detection-with-stegdetect/ Stegdetect] - Detects jsteg, [[JPHS (JPHide/JPSeek)]], invisible secrets, outguess 01.3b, F5 (header analysis), appendX and camouflage
 
* [https://farid.berkeley.edu/ Steganalysis papers by Hany Farid]
 
* [https://farid.berkeley.edu/ Steganalysis papers by Hany Farid]
** [https://farid.berkeley.edu/downloads/publications/tr01.pdf Detecting Steganographic Messages in Digital Images] - Jsteg, EZStego, OutGuess
+
** [https://farid.berkeley.edu/downloads/publications/tr01.pdf Detecting Steganographic Messages in Digital Images] - Jsteg, EZStego, [[OutGuess]]
 
*** [https://farid.berkeley.edu/downloads/code/steg.m Matlab source code]
 
*** [https://farid.berkeley.edu/downloads/code/steg.m Matlab source code]
** [https://farid.berkeley.edu/downloads/publications/icip02.pdf Detecting Hidden Messages Using Higher-Order Statistical Models] - Jsteg, EZStego, OutGuess
+
** [https://farid.berkeley.edu/downloads/publications/icip02.pdf Detecting Hidden Messages Using Higher-Order Statistical Models] - Jsteg, EZStego, [[OutGuess]]
 
* [https://sourceforge.net/projects/ben4dstegdetect/ Ben-4D Steganalysis Software] - Detects [[JPHS (JPHide/JPSeek)]], LSB, Invisible Secrets v4.0, Fuse, Camouflage v1.2.1
 
* [https://sourceforge.net/projects/ben4dstegdetect/ Ben-4D Steganalysis Software] - Detects [[JPHS (JPHide/JPSeek)]], LSB, Invisible Secrets v4.0, Fuse, Camouflage v1.2.1
  

Revision as of 20:49, 28 August 2023

File Format
Name Steganography
Ontology

Steganography is a class of encryption in which the very fact that information exists is obscured. For example, an innocent-looking PNG image could contain a secret message encoded in its seemingly-random least-significant bits. Assuming the algorithm is sufficiently secure, it would be impossible to know whether the message exists or not, unless you know the secret key.

Formats

For a list of formats, see Encryption#Steganography.

Detection

Links

Personal tools
Namespaces

Variants
Actions
Navigation
Toolbox