Image Steganography Tool Logo

Image Steganography Tool

0
Free
Visit Website

Simple C++ Encryption and Steganography tool that uses Password-Protected-Encryption to secure a file's contents, and then proceeds to embed it inside an image's pixel-data using Least-Significant-Bit encoding. For Linux, MacOS, and Windows systems. - Encoding $ ./steganography encode -i data/orig.png -e data/jekyll_and_hyde.zip -o output.png - Password: 1234 - Image size: 640x426 pixels - Encoding level: Low (Default) - Max embed size: 132.38 KiB - Embed size: 61.77 KiB - Encrypted embed size: 61.78 KiB - Generated CRC32 checksum - Generated encryption key with PBKDF2-HMAC-SHA-256 (20000 rounds) - Encrypted embed with AES-256-CBC - Embedded jekyll_and_hyde.zip into image - Successfully wrote to output.png - Original image: Image with embedded ZIP containing the entire contents of the book 'Dr Jekyll and Mr Hyde' - Decoding $ ./steganography decode -i output.png -o 'out - jekyll_and_hyde.zip' - Password: 1234 - Image size: 640x426 pixels - Generated decryption key with PBKDF2-HMAC-SHA-256 (20000 rounds) - Successfully decrypted header - File signatures match - Detected embed jekyll_and_hyde.zip - Encoding level: Low (Default) - Encrypted embed size: 61.78 KiB - Successfully

FEATURES

ALTERNATIVES

A unified data security platform that discovers, classifies, monitors, and protects sensitive data across cloud, SaaS, and on-premises environments while ensuring compliance and automating security processes.

Commercial

A network-based panic button to overwrite LUKS header and shutdown the computer in emergencies, making data recovery impossible.

Steganography brute-force utility with performance issues, deprecated in favor of stegseek.

Themis provides strong, usable cryptography for busy people.

Tang is a server for binding data to network presence, providing an easy and secure alternative to key escrow.

steg86 is a format-agnostic steganographic tool for x86 and AMD64 binaries.

GPG Sync is a tool designed to keep OpenPGP public keys up-to-date within an organization by offloading the complexity of key management to a single trusted person.

Showcasing bad cryptography and discussing flawed crypto design.

PINNED