Steganography

From Just Solve the File Format Problem
(Difference between revisions)
Jump to: navigation, search
Line 10: Line 10:
  
 
== Detection ==
 
== Detection ==
* [https://github.com/daniellerch/aletheia Aletheia] - Detects [[F5]], [[Steghide]], LSB replacement, LSB matching and some kind of adaptive schemes
+
* [https://sourceforge.net/projects/ben4dstegdetect/ Ben-4D Steganalysis Software] - Detects [[JPHS (JPHide/JPSeek)]], LSB, [[Invisible Secrets|Invisible Secrets v4.0]], Fuse, [[Camouflage|Camouflage v1.2.1]]
* [https://sourceforge.net/projects/ben4dstegdetect/ Ben-4D Steganalysis Software] - Detects [[JPHS (JPHide/JPSeek)]], LSB, Invisible Secrets v4.0, Fuse, [[Camouflage|Camouflage v1.2.1]]
+
* [https://www.provos.org/p/detection-with-stegdetect/ Stegdetect] - Detects jsteg, [[JPHS (JPHide/JPSeek)]], [[Invisible Secrets]], [[OutGuess|OutGuess 01.3b]], [[F5]] (header analysis), appendX and [[Camouflage]]
* [https://www.provos.org/p/detection-with-stegdetect/ Stegdetect] - Detects jsteg, [[JPHS (JPHide/JPSeek)]], invisible secrets, [[OutGuess|OutGuess 01.3b]], [[F5]] (header analysis), appendX and [[Camouflage]]
+
* [http://www.spy-hunter.com/stegspy StegSpy] - Detects [[JPHS (JPHide/JPSeek)]], Hiderman, Masker, [[JPegX]], [[Invisible Secrets]]
* [http://www.spy-hunter.com/stegspy StegSpy] - Detects [[JPHS (JPHide/JPSeek)]], Hiderman, Masker, [[JPegX]], Invisible Secrets
+
 
* [https://farid.berkeley.edu/ Steganalysis papers by Hany Farid]
 
* [https://farid.berkeley.edu/ Steganalysis papers by Hany Farid]
 
** [https://farid.berkeley.edu/downloads/publications/tr01.pdf Detecting Steganographic Messages in Digital Images] - Jsteg, EZStego, [[OutGuess]]
 
** [https://farid.berkeley.edu/downloads/publications/tr01.pdf Detecting Steganographic Messages in Digital Images] - Jsteg, EZStego, [[OutGuess]]
Line 21: Line 20:
  
 
== Cracking ==
 
== Cracking ==
* [https://github.com/daniellerch/aletheia Aletheia] - dictionary attacks on [[steghide]], [[OutGuess]], [[OpenStego]]
 
 
* [https://www.provos.org/p/detection-with-stegdetect/ StegBreak] (included with Stegdetect) - dictionary attacks against JSteg-Shell, [[JPHS (JPHide/JPSeek)]] and [[OutGuess|OutGuess 01.3b]]
 
* [https://www.provos.org/p/detection-with-stegdetect/ StegBreak] (included with Stegdetect) - dictionary attacks against JSteg-Shell, [[JPHS (JPHide/JPSeek)]] and [[OutGuess|OutGuess 01.3b]]
 
* [https://github.com/RickdeJager/stegseek Stegseek] - dictionary attacks against [[steghide]]
 
* [https://github.com/RickdeJager/stegseek Stegseek] - dictionary attacks against [[steghide]]
 
* [https://github.com/Paradoxis/StegCracker StegCracker] - dictionary attacks against [[steghide]]
 
* [https://github.com/Paradoxis/StegCracker StegCracker] - dictionary attacks against [[steghide]]
 
* [https://github.com/R4yGM/stegbrute StegBrute] - dictionary attacks against [[steghide]]
 
* [https://github.com/R4yGM/stegbrute StegBrute] - dictionary attacks against [[steghide]]
 +
 +
 +
== General ==
 +
* [https://github.com/daniellerch/aletheia Aletheia]
 +
** Detects [[F5]], [[Steghide]], LSB replacement, LSB matching and some kind of adaptive schemes
 +
** Dictionary attacks on [[steghide]], [[OutGuess]], [[OpenStego]]
 +
* [https://www.wetstonetech.com/products/stegohunt-steganography-detection/ StegoHunt MP] and [https://www.wetstonetech.com/products/stegocommand-steganography-detection/ StegoCommand]
 +
** StegoHunt: identifies thousands of steganography, stegware and data hiding applications
 +
** StegoAnalyst: DCT coefficients, color pairs, etc
 +
** StegoBreak: Dictionary attacks against many steganography programs
 +
** StegoCommand: Statistical and structural anomalies, data appending and prepending, misplaced or suspect text or binary
 +
* [https://github.com/rajan98/StegoSuit StegoSuit] - perform ELA (Error Level Analysis), String, Threshold, Edge and Metadata analysis of any image
 +
  
  

Revision as of 20:17, 1 September 2023

File Format
Name Steganography
Ontology

Steganography is a class of encryption in which the very fact that information exists is obscured. For example, an innocent-looking PNG image could contain a secret message encoded in its seemingly-random least-significant bits. Assuming the algorithm is sufficiently secure, it would be impossible to know whether the message exists or not, unless you know the secret key.

Contents

Formats

For a list of formats, see Encryption#Steganography.


Detection


Cracking


General

  • Aletheia
  • StegoHunt MP and StegoCommand
    • StegoHunt: identifies thousands of steganography, stegware and data hiding applications
    • StegoAnalyst: DCT coefficients, color pairs, etc
    • StegoBreak: Dictionary attacks against many steganography programs
    • StegoCommand: Statistical and structural anomalies, data appending and prepending, misplaced or suspect text or binary
  • StegoSuit - perform ELA (Error Level Analysis), String, Threshold, Edge and Metadata analysis of any image


See also


Links

Personal tools
Namespaces

Variants
Actions
Navigation
Toolbox