Image Steganography Tool Logo

Image Steganography Tool

0
Free
Visit Website

Simple C++ Encryption and Steganography tool that uses Password-Protected-Encryption to secure a file's contents, and then proceeds to embed it inside an image's pixel-data using Least-Significant-Bit encoding. For Linux, MacOS, and Windows systems. - Encoding $ ./steganography encode -i data/orig.png -e data/jekyll_and_hyde.zip -o output.png - Password: 1234 - Image size: 640x426 pixels - Encoding level: Low (Default) - Max embed size: 132.38 KiB - Embed size: 61.77 KiB - Encrypted embed size: 61.78 KiB - Generated CRC32 checksum - Generated encryption key with PBKDF2-HMAC-SHA-256 (20000 rounds) - Encrypted embed with AES-256-CBC - Embedded jekyll_and_hyde.zip into image - Successfully wrote to output.png - Original image: Image with embedded ZIP containing the entire contents of the book 'Dr Jekyll and Mr Hyde' - Decoding $ ./steganography decode -i output.png -o 'out - jekyll_and_hyde.zip' - Password: 1234 - Image size: 640x426 pixels - Generated decryption key with PBKDF2-HMAC-SHA-256 (20000 rounds) - Successfully decrypted header - File signatures match - Detected embed jekyll_and_hyde.zip - Encoding level: Low (Default) - Encrypted embed size: 61.78 KiB - Successfully

FEATURES

ALTERNATIVES

Audio file steganography tool

Cyera is a data security platform that discovers, classifies, and secures sensitive data across various environments, offering features such as DSPM, identity data access, and data privacy compliance.

Commercial

A cloud-native, event-driven data pipeline toolkit for security teams with extensible data processing and serverless deployment.

A machine learning-based approach to detect and prevent data breaches using natural language processing and machine learning algorithms.

Zama's fhEVM Coprocessor is an open-source tool for developing applications using Fully Homomorphic Encryption, enabling privacy-preserving computations in various domains.

A quantum-safe data protection solution that secures data in transit using Layer 4 encryption, crypto-segmentation, and unified security reporting to defend against current and future cryptographic threats.

Commercial

Red October is a software-based two-man rule style encryption and decryption server.

TestDisk checks disk partitions and recovers lost partitions, while PhotoRec specializes in recovering lost pictures from digital camera memory or hard disks.