Image Steganography Tool Logo

Image Steganography Tool

0
Free
Visit Website

Simple C++ Encryption and Steganography tool that uses Password-Protected-Encryption to secure a file's contents, and then proceeds to embed it inside an image's pixel-data using Least-Significant-Bit encoding. For Linux, MacOS, and Windows systems. - Encoding $ ./steganography encode -i data/orig.png -e data/jekyll_and_hyde.zip -o output.png - Password: 1234 - Image size: 640x426 pixels - Encoding level: Low (Default) - Max embed size: 132.38 KiB - Embed size: 61.77 KiB - Encrypted embed size: 61.78 KiB - Generated CRC32 checksum - Generated encryption key with PBKDF2-HMAC-SHA-256 (20000 rounds) - Encrypted embed with AES-256-CBC - Embedded jekyll_and_hyde.zip into image - Successfully wrote to output.png - Original image: Image with embedded ZIP containing the entire contents of the book 'Dr Jekyll and Mr Hyde' - Decoding $ ./steganography decode -i output.png -o 'out - jekyll_and_hyde.zip' - Password: 1234 - Image size: 640x426 pixels - Generated decryption key with PBKDF2-HMAC-SHA-256 (20000 rounds) - Successfully decrypted header - File signatures match - Detected embed jekyll_and_hyde.zip - Encoding level: Low (Default) - Encrypted embed size: 61.78 KiB - Successfully

FEATURES

ALTERNATIVES

Red October is a software-based two-man rule style encryption and decryption server.

Obtain GraphQL API schema even if the introspection is disabled

A network-based panic button to overwrite LUKS header and shutdown the computer in emergencies, making data recovery impossible.

BleachBit cleans files to free disk space and maintain privacy with various options and command line interface support.

Steghide is a steganography program that hides data in image and audio files.

A machine learning-based approach to detect and prevent data breaches using natural language processing and machine learning algorithms.

Tool for hiding data inside data and manipulating byte sequences.

A utility tool for decrypting data from weak public keys and attempting to recover the corresponding private key, primarily for educational purposes.