Steganography

From Just Solve the File Format Problem
(Difference between revisions)
Jump to: navigation, search
Line 36: Line 36:
 
** StegoCommand: Statistical and structural anomalies, data appending and prepending, misplaced or suspect text or binary
 
** StegoCommand: Statistical and structural anomalies, data appending and prepending, misplaced or suspect text or binary
 
* [https://github.com/rajan98/StegoSuit StegoSuit] - perform ELA (Error Level Analysis), String, Threshold, Edge and Metadata analysis of any image
 
* [https://github.com/rajan98/StegoSuit StegoSuit] - perform ELA (Error Level Analysis), String, Threshold, Edge and Metadata analysis of any image
 +
* [https://codeberg.org/tob/Stegosuite-Analysis Stegosuite Analysis] - chi square, LSB visualization, histogram (neighborhood, pixels difference, pov), sorted color table attack
  
  

Revision as of 20:23, 1 September 2023

File Format
Name Steganography
Ontology

Steganography is a class of encryption in which the very fact that information exists is obscured. For example, an innocent-looking PNG image could contain a secret message encoded in its seemingly-random least-significant bits. Assuming the algorithm is sufficiently secure, it would be impossible to know whether the message exists or not, unless you know the secret key.

Contents

Formats

For a list of formats, see Encryption#Steganography.


Detection


Cracking


General

  • Aletheia
  • StegoHunt MP and StegoCommand
    • StegoHunt: identifies thousands of steganography, stegware and data hiding applications
    • StegoAnalyst: DCT coefficients, color pairs, etc
    • StegoBreak: Dictionary attacks against many steganography programs
    • StegoCommand: Statistical and structural anomalies, data appending and prepending, misplaced or suspect text or binary
  • StegoSuit - perform ELA (Error Level Analysis), String, Threshold, Edge and Metadata analysis of any image
  • Stegosuite Analysis - chi square, LSB visualization, histogram (neighborhood, pixels difference, pov), sorted color table attack


See also


Links

Personal tools
Namespaces

Variants
Actions
Navigation
Toolbox