JPHS (JPHide/JPSeek)
Parchivist (Talk | contribs) (Created page with "{{FormatInfo |formattype=electronic |subcat=Encryption |subcat2=Steganography }} '''JPHS''' (JPHide, JPSeek, JPHSWin) by Allan Latham is a steganography program that hides in...") |
Parchivist (Talk | contribs) |
||
Line 10: | Line 10: | ||
The design objective was not simply to hide a file but rather to do this in such a way that it is impossible to prove that the host file contains a hidden file. Given a typical visual image, a low insertion rate (under 5%) and the absence of the original file, it is not possible to conclude with any worthwhile certainty that the host file contains inserted data. Above 15% the effects begin to become visible to the naked eye. Of course some images are much better than others when used a host file - plenty of fine detail is good. A cloudless blue sky over a snow covered ski paradise is bad. A waterfall in a forest is probably ideal. | The design objective was not simply to hide a file but rather to do this in such a way that it is impossible to prove that the host file contains a hidden file. Given a typical visual image, a low insertion rate (under 5%) and the absence of the original file, it is not possible to conclude with any worthwhile certainty that the host file contains inserted data. Above 15% the effects begin to become visible to the naked eye. Of course some images are much better than others when used a host file - plenty of fine detail is good. A cloudless blue sky over a snow covered ski paradise is bad. A waterfall in a forest is probably ideal. | ||
+ | |||
+ | There are reports that the original one crashed all the time. If that happens to you, try the version from SSAK or Steganography Toolkit. | ||
Line 20: | Line 22: | ||
* [https://sourceforge.net/projects/ben4dstegdetect/ Ben-4D Steganalysis Software] - detects JPHSWin files | * [https://sourceforge.net/projects/ben4dstegdetect/ Ben-4D Steganalysis Software] - detects JPHSWin files | ||
* [http://eprints.bournemouth.ac.uk/24621/1/NATO%20SPI13%281%29.pdf Study of how well JPHS evades detection] | * [http://eprints.bournemouth.ac.uk/24621/1/NATO%20SPI13%281%29.pdf Study of how well JPHS evades detection] | ||
+ | * [https://github.com/mmtechnodrone/SSAK SSAK] - GUI front end for file identification, data carving, hexdump and steganography programs that includes JPHS | ||
+ | * [https://github.com/DominicBreuker/stego-toolkit Steganography Toolkit] - Docker image with a bunch of steganography tools including JPHS |
Revision as of 21:59, 28 August 2023
JPHS (JPHide, JPSeek, JPHSWin) by Allan Latham is a steganography program that hides information in JPEG files with password protection.
Source code and versions for DOS, Windows and Linux are available.
The design objective was not simply to hide a file but rather to do this in such a way that it is impossible to prove that the host file contains a hidden file. Given a typical visual image, a low insertion rate (under 5%) and the absence of the original file, it is not possible to conclude with any worthwhile certainty that the host file contains inserted data. Above 15% the effects begin to become visible to the naked eye. Of course some images are much better than others when used a host file - plenty of fine detail is good. A cloudless blue sky over a snow covered ski paradise is bad. A waterfall in a forest is probably ideal.
There are reports that the original one crashed all the time. If that happens to you, try the version from SSAK or Steganography Toolkit.
Links
- Archived homepage
- Downloads
- Tutorial
- Video tutorial (related blog post)
- Stegdetect - finds JPHS files
- Ben-4D Steganalysis Software - detects JPHSWin files
- Study of how well JPHS evades detection
- SSAK - GUI front end for file identification, data carving, hexdump and steganography programs that includes JPHS
- Steganography Toolkit - Docker image with a bunch of steganography tools including JPHS