Steganography
From Just Solve the File Format Problem
				
								
				Revision as of 16:25, 2 September 2023 by Parchivist  (Talk | contribs)
Steganography is a class of encryption in which the very fact that information exists is obscured. For example, an innocent-looking PNG image could contain a secret message encoded in its seemingly-random least-significant bits. Assuming the algorithm is sufficiently secure, it would be impossible to know whether the message exists or not, unless you know the secret key.
Contents | 
Formats
For a list of formats, see Encryption#Steganography.
Detection
- Ben-4D Steganalysis Software - Detects JPHS (JPHide/JPSeek), LSB, Invisible Secrets v4.0, Fuse, Camouflage v1.2.1
 - Stegdetect - Detects jsteg, JPHS (JPHide/JPSeek), Invisible Secrets, OutGuess 01.3b, F5 (header analysis), appendX and Camouflage
 - StegSpy - Detects JPHS (JPHide/JPSeek), Hiderman, Masker, JPegX, Invisible Secrets
 -  Steganalysis papers by Hany Farid
- Detecting Steganographic Messages in Digital Images - Jsteg, EZStego, OutGuess
 - Detecting Hidden Messages Using Higher-Order Statistical Models - Jsteg, EZStego, OutGuess
 
 
Cracking
- StegBreak (included with Stegdetect) - dictionary attacks against JSteg-Shell, JPHS (JPHide/JPSeek) and OutGuess 01.3b
 - Stegseek - dictionary attacks against steghide
 - StegCracker - dictionary attacks against steghide
 - StegBrute - dictionary attacks against steghide
 
General
- Aletheia
 -  StegoHunt MP and StegoCommand
- StegoHunt: identifies thousands of steganography, stegware and data hiding applications
 - StegoAnalyst: DCT coefficients, color pairs, etc
 - StegoBreak: Dictionary attacks against many steganography programs
 - StegoCommand: Statistical and structural anomalies, data appending and prepending, misplaced or suspect text or binary
 
 - StegoSuit - perform ELA (Error Level Analysis), String, Threshold, Edge and Metadata analysis of any image
 - Stegosuite Analysis - chi square, LSB visualization, histogram (neighborhood, pixels difference, pov), sorted color table attack
 
Research
Filesystem
- The Steganographic File System
 - Hiding Data Accesses in Steganographic File System
 - StegFS: A Steganographic File System PANG, Hwee Hwa; TAN, Kian-Lee; and ZHOU, Xuan. (2003)
 - DEFY: A Deniable, Encrypted File System for Log Structured Storage Peters, Timothy & Gondree, Mark & Peterson, Zachary. (2015)
 - Wikipedia article
 
See also