Image Steganography Tool Logo

Image Steganography Tool

0
Free
Visit Website

Simple C++ Encryption and Steganography tool that uses Password-Protected-Encryption to secure a file's contents, and then proceeds to embed it inside an image's pixel-data using Least-Significant-Bit encoding. For Linux, MacOS, and Windows systems. - Encoding $ ./steganography encode -i data/orig.png -e data/jekyll_and_hyde.zip -o output.png - Password: 1234 - Image size: 640x426 pixels - Encoding level: Low (Default) - Max embed size: 132.38 KiB - Embed size: 61.77 KiB - Encrypted embed size: 61.78 KiB - Generated CRC32 checksum - Generated encryption key with PBKDF2-HMAC-SHA-256 (20000 rounds) - Encrypted embed with AES-256-CBC - Embedded jekyll_and_hyde.zip into image - Successfully wrote to output.png - Original image: Image with embedded ZIP containing the entire contents of the book 'Dr Jekyll and Mr Hyde' - Decoding $ ./steganography decode -i output.png -o 'out - jekyll_and_hyde.zip' - Password: 1234 - Image size: 640x426 pixels - Generated decryption key with PBKDF2-HMAC-SHA-256 (20000 rounds) - Successfully decrypted header - File signatures match - Detected embed jekyll_and_hyde.zip - Encoding level: Low (Default) - Encrypted embed size: 61.78 KiB - Successfully

FEATURES

ALTERNATIVES

Monitors GitHub for leaked secrets

A tool for recovering files by scanning block devices and extracting them based on 'magic bytes' in file contents.

TestDisk checks disk partitions and recovers lost partitions, while PhotoRec specializes in recovering lost pictures from digital camera memory or hard disks.

A sensitive data detection tool for scanning source code repositories

ELFcrypt encrypts ELF binaries to prevent reverse engineering.

Tenzir is a data pipeline solution for optimizing cloud and data costs, running detections and analytics.

Toolkit for secure destruction of sensitive data with customizable overwrite methods.

Detect stegano-hidden data in PNG & BMP using zsteg tool.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved