You are on page 1of 18

STEGANOGRAPHY SOFTWARE

Welcome to the Steganography Software for JJTC.Com


Steganography applications conceal information in other, seemingly innocent media. Steganographic results may masquerade as other file for data types,
be concealed within various media, or even hidden in network traffic or disk space. We are only limited by our imagination in the many ways information
and data can be exploited to conceal additional information.

Over the years I've been asked to add steganography and related application to my website, in the tool matrix, or steganography list. For the most part
my steganography pages have been a way to disseminate information about my research and interests.

The following provides a list of stegangraphy and related products. If URLs are provided to access the software, please provide the URL to the developers'
sites rather than to binaries for download. As tools are added, let's try to keep them in alphabetical order. Websites come and go. Try to verify valid URLs
prior to posting them as locations for more information.

NOTICE: Some of the programs listed here contain strong encryption components, and the export of them from the US is restricted by the EAR
regulations. In order to avoid violating these restrictions, the application are NOT hosted on this site. Binaries are not linked from this page - please refrain
from linking directly to binary files for download when adding new tools.

--

Neil F. Johnson, Ph.D. JJTC.Com

Main Page | Steganography Page

1. Blindside by John Collomosse. Last known addresses: ma7jpc@bath.ac.uk http://www.blindside.co.uk/

2. BMP Secrets by Parallel Worlds. Parallel Worlds is a company based in Kiev, capital of Ukraine. Tel.: +380 (44) 442 6077 Tel./Fax.: +380 (44) 442 0516
Pager: +380 (44) 461 0146 ab# 100252 GSM SMS: chekh@sms.umc.com.ua e-mail: chekh@pworlds.com · General Information: Info_PW@kbi.kiev.ua ·
Services: Services_PW@kbi.kiev.ua · Customer and Product Support: Support_PW@kbi.kiev.ua · Products Sales: Sales_PW@kbi.kiev.ua · Web design:
webmaster_PW@kbi.kiev.ua · Other questions: admin_PW@kbi.kiev.ua Visit Parallel Worlds page at http://www.pworlds.com Visit our steganography page
at http://www.pworlds.com/techn/steganography.phtml Visit BMP Secrets page at http://www.pworlds.com/products/bmp-
secrets.phtml http://www.pworlds.com

3. BMPEmbed v1.54 (DEMO) Data Embed by Brook Sandford and Ted Handel (LANL.gov) IMAGES: (BMP )

4. BMPTable v2.16 (DEMO) Data Embed by Brook Sandford and Ted Handel (LANL.gov) Brook Sandford mts@lanl.gov Ted Handel thandel@lanl.gov IMAGES:
(BMP )

5. Camouflage 2.0 by Frederic Peters. Last known contact information for the author: Frédéric Péters, rue Chantraine, 38 4420 Montegnée Belgique e-mail :
fpeters@chanae.alphanet.ch fpeters@mygale.org IMAGES: (TGA (24-bit uncompressed, 640x480, minimum of 921618 bytes). Author recommends using
PNG. )

6. Contraband Hell Edition (CHE) by Julius B. Thyssen & Hens Zimmerman of Immortalware / JTHZ Productions based in Amsterdam, The Netherlands. Last
known urls: http://come.to/us orhttp://www.jthz.com/puter/ CHE runs on Win9x and process 24-bit BMP images

7. Contraband, Contraband 9g by Julius B. Thyssen & Hens Zimmerman of Immortalware / JTHZ Productions based in Amsterdam, The Netherlands. Last
known urls: http://come.to/us orhttp://www.jthz.com/puter/ CHE runs on Win9x and process 24-bit BMP images

8. Courier v1.0 by Kelce Wilson. Last known address: http://pages.prodigy.net/robyn.wilson/ runs on Win32 systems and embeds in IMAGES: (BMP (24-bit -
will convert lower resolutions to 24-bit) )

9. Covert.tcp C source code for Covert Channels in the TCP/IP Protocol Suite by Craig H. Rowland. Published in f¡®sT - moñd@¥ (First Monday), Vol.2 No.5 -
5 May 1997. The article and source code are available from http://www.firstmonday.dk/issues/issue2_5/rowland/

10. Data Stash v1.1, v1.1a Lim, Chooi Guan Previous addresses: webmaster@famousguy.net http://www.skyjuicesoftware.com/software/ds_info.html Claims
to embed in the following media: IMAGES: (any binary ) AUDIO: (any binary ) TEXT: (yes, but suggest avoiding ) FILE/DISK: (any binary ) OTHER: (any
binary )

11. dc-Steganograph The application is also known as: DC-Stego and DiSi-Steganograph. A DOS program that hides data in 320x200 256 color PCX-files.
Author's last known address:http://members.tripod.com/~Nikola_Injac/stegano/
12. DCT-Steg (aka DCT-Jpeg) by Stefan Katzenbeisser embeds in JPEG images by manipulating the DCT coefficients

13. Digital Picture Envelope by the Digital Picture Enveloping Research Group. Product is based on the BPCS Steganography research. Previous addresses:
bpcs@know.comp.kyutech.ac.jphttp://www.know.comp.kyutech.ac.jp/BPCSe/Dpenv-e/DPENVe-home.html The application runs on Win32. IMAGES: (BMP
(adaptive) )

14. Diskhide by MTC Medincom (Russia). DOS application that hides data on disks

15. Dmagic by Ðerek de Oliveira (Russia) Previous addresses: dede11@hotmail.com and BigD99860@juno.com Hides files and folders on Windows systems

16. DPT (Data Privacy Tool) by Bernard Last known URL: http://www.xs4all.nl/~bernard/home_e.html Hides in BMP images. The author recommends 24-bit
BMPs

17. EasyPrivacy Pro v2.1.1 by D4F Corp Last known addresses: Landstrasse 25, 9490 Vaduz, Liechtenstein ( Europe ) Mail@digi4fun.com or
webmaster@digi4fun.comhttp://www.digi4fun.com/EasyPrivacy.html The application runs on Win32 systems and embeds in BMP images

18. EIKONAmark by I. Pitas is now a series of watermarking products that embed in a variety of media types. The original EIKONAmark processed images:
(input: BMP, JPG, TIF, TGA, GIF output: TIF, TGA, JPG)

19. Empty Pic by Robert Wallingford. Previous addresses: wallingford@usa.net, prof.engineer@usa.net, and robertw@crtelco.com
URL: http://www.crtelco.com/~robertw/ Empty Pic is a command line tool for Windows that "hides" a GIF image by replacing the palette with a single color.
The original may be restored with the software.

20. Encrypt Pic by Fredric Collin. Previous addresses:


Frederic.Collin@advalvas.be, http://members.nbci.com/_XMCM/fredc/index2.html http://members.nbci.com/_XMCM/fredc/encryptpic.htmlhttp://members.
xoom.com/fredc/encryptpic.html The application runs on Win32 systems. Data is embedded in BMP images.

21. Encrypted Magic Folders (EMF) (also Magic Folders) by PC Magic Software Addresses: info@pc-magic.com http://www.pc-magic.com/ This application
hides and encrypts files and folders

22. EzStego by Romana Machado, author of Stego1a2 for the Mac. EzStego is "steganography made easy" - previously available at http://www.stego.com.
EzStego is an implementation of Stego in Java. Stego is available at http://www.nic.funet.fi/pub/crypt/steganography/

23. F5 by Andreas Westfeld (Dresden, Germany) Previous addresses: westfeld@inf.tu-dresden.de http://www.inf.tu-dresden.de/~aw4 The application hides in
JPEG images by manipulating the DCT coefficients

24. FatMacPGP 2.6.3 Previous address: http://www.math.ohio-state.edu/~fiedorow/PGP This application is for MAC computers

25. FFEncode Hides data in a Morse code of null characters. The file maybe downloaded from http://www.rugeley.demon.co.uk/security/encrypt.htm (UK).

26. Folder Guard Jr. (also see Folder Guard) by WinAbility (Andrei Belogortseff). Previous address: WinAbility, P.O.Box 5534 Buffalo Grove, IL 60089-5534
U.S.A. http://www.winability.com WIN: (9x/Me/NT/2000 ) FILE/DISK: (hide files & folders )

27. Folder Guard by WinAbility (Andrei Belogortseff). WinAbility? P.O.Box 5534 Buffalo Grove, IL 60089-5534 U.S.A. http://www.winability.com This product
has more features than Folder Guard Jr. WIN: (Win 9x/Me/@K/XP/Vista ) FILE/DISK: (hide files & folders )

28. Ghost Host by Kelce Wilson. Previous address: http://pages.prodigy.net/robyn.wilson/ WIN: (Win ) FILE/DISK: (Hides (appends) "ghost" files at the end
for other files. )

29. Gif-It-Up by Lee Nelson. Win32 application that hides in GIF images.

30. Gifshuffle by Matthew Kwan (Darkside Technologies) - Australia. Previous addresses:


mkwan@darkside.com.au http://www.darkside.com.au/gifshuffle/ WIN: (Win (DOS) ) IMAGES: (GIF (palette manipulation) )

31. Giovanni by BlueSpike, Inc (Scott Moskowitz). http://www.bluespike.com Bluespike offers watermarking products for various media formats

32. Gzsteg by Andy Brown and Ken Pizzini hides in GZ compressed files and is available at http://www.nic.funet.fi/pub/crypt/steganography/

33. Hermetic Stego by Peter Meyer, Hermetic Systems This program is capable of hiding in a BMP image or across multiple BMP images. More information and
download fromhttp://www.hermetic.ch/hst/hst.htm

34. Hidden by Evgeny Vasjuk Previous addresses: evgenyww@bashnet.ru evgenyww@windoms.sitek.net http://www.bashnet.ru/~evgenyww/ FILE/DISK:
(hide files and folders )

35. Hide and Seek by Colin Maroney Hide and Seek 4.1 http://www.nic.funet.fi/pub/crypt/steganography/ (Finland) and Hide and Seek 5.0 is significant
update to hideseek v4.1 which includes a lot of new features. Available at www.rugeley.demon.co.uk (UK) Hide and Seek for Windows 95 is also available

36. Hide In Picture by Davi Tassinari de Figueiredo. Previous addresses:


davitf@usa.net http://www.brasil.terravista.pt/Jenipabu/2571 PORTUGALhttp://www.brasil.terravista.pt/Jenipabu/2571/e_hip.htm WIN: (9x/Win32)
IMAGES: (BMP )

37. Hide Unhide (Hide) by GRYPHON Microproducts (no longer exists). Previous address: PO BOX 10087, Silver Spring, MD 20914, USA DOS command line
IMAGES: (TIFF)

38. Hide by Toby Sharp. Previous addresses: Secret Software TSharp@Serif.com http://www.geocities.com/toby.sharp/hidev2.zip WIN32 IMAGES: (24-bit
color, 8-bit grayscale )

39. Hide4PGP by Heinz Repp hides data in BMP, WAV, and VOC files. Available from the author's website: http://www.heinz-
repp.onlinehome.de/Hide4PGP.htm (Germany)

40. Hideme (Hide Me) for Windows (encryption tool) by Terry Mechan Olympic Communications Previous address:
Olympic@Netwales.co.uk http://www.fis.lv/olympic Hides files & directories by encrypting them and placing them in a "hide me" file

41. In Plain View (IPV) by 9-Yards Computing. Previous addresses: jweiler@9-Yards.com http://www.9-Yards.com Win32 IMAGES: (BMP (24-bit) )

42. InThePicture (ITP) 2.01, 2.02 by INTAR Technologies. Previous addresses: 23 Sapphire Drive Barons Wood Royal Leamington Spa Warwickshire, CV31
3LB ENGLAND Administrative Contact, Billing Contact: Hogg, Ash (AH2184) ash@INTAR.COM Intar Technologies Limited 12 Penfold Close Bishops
Tachbrook Leamington Spa CV33 9SF UK +44-(0)1926-426621 (FAX) +44-(0)1926-426621http://www.intar.com/ITP/itpinfo.htm WIN: (9x ) IMAGES:
(BMP (4-bit, 8-bit, 24-bit) )

43. Invisible Encryption by Bernd Binder Fractal Iteration of Information (FITIN) Germany http://www.fitin.com (down for some time) Written in JAva
IMAGES: (GIF )

44. Invisible Files 2000 (IF2000), Pro v5.0 (IF2000 Pro) by ANNA Ltd. Previous addresses: if2000@anna.zaporizhzhe.ua Technical Support:
support@softsecurity.com Any other questions: contact@softsecurity.com FAX: (508) 355-8507 http://www.softsecurity.com WIN: (9x ) FILE/DISK: (hides
files and folders )

45. Invisible Secrets (numberous versions - also marketed as 1-2-Free Steganography) originally by NeoByte? Solutions. Headquarters: Aleea Rogerius 12
Bloc H1, Ap. 11 Oradea Romania Previous addresses: Corporate WWW: http://www.neobytesolutions.com Invisible Secrets
homepage : http://www.invisiblesecrets.com WIN: Win32 Claims to hide in: IMAGES: (BMP, PNG, JPG) AUDIO: (WAV) TEXT: (HTML)

46. jpeg-jsteg DOS hides information in the DCT coefficients of JPEG's JFIF image format. FTP-
Server: http://www.nic.funet.fi/pub/crypt/steganography/ (Finland)

47. JPHS (aka JPHide JPSeek, JP hide and seek) by Allan Latham Previous address: http://linux01.gwdg.de/~alatham/stego.html Windows Command line
and linux versions IMAGES: (JPG )

48. JPHSWin by Allan Latham. A Windows OS graphical implementation of JPHS. WIN: (9x ) IMAGES: (JPG )

49. Jsteg Shell by John Korejwa Previous address: http://www.tiac.net/users/korejwa/jsteg.htm GUI front end for jpeg-jsteg. WIN: (9x/NT ) IMAGES: ( JPG -
LSB of DCT coefficients )

50. Magic Folders (MF) (also see Encrypted Magic Folders) by RSE Software Inc.(PC Magic Software). http://www.pc-magic.com/ FILE/DISK: (Hide files and
folders )

51. Makes Files Invisible (MFI) by PC Magic Software Previous address: MFI Registration 1157 57th Drive SE Auburn, WA 98092 (253) 939-4105 http://pc-
magic.com WIN: (3.x/9x ) FILE/DISK: (hide files )

52. Mandelsteg by Henry Hastur DOS Command line product. Generates GIF images of Mandelbrot Fractal graphics for hiding data.
53. Mimic by Peter Wayner. Generates text using context free grammar

54. MP3Stego, MP3Stego_GUI by Fabien Petitcolas. http://www.petitcolas.net/fabien/steganography/mp3stego/index.html AUDIO: (MP3 )

55. MP3Stegz, by Achmad Zaenuri claims to hide a file (of any type) inside mp3 without changing it's size and sound
quality. http://achmadz.blogspot.com/2008/05/hide-any-file-inside-mp3-file.htmlAUDIO: (MP3 )

56. Nicetext by George Davida and Mark T. Chapman Previous addresses: markc@ctgi.net http://www.nicetext.com/ http://www.ctgi.net/nicetext/ Pseudo-
random text-based stego using context-free grammer and customizable dictionaries

57. Outguess by Niels Provos http://www.outguess.org/ Another tool for hiding in DCT coefficients of JPEG images.

58. Paranoid by Nathan Mariels. Paranoid is primarily an encryption program that allows you to encrypt files with IDEA, triple DES, and an algorithm written by
the author Nathan Mariels. It is a steganography program in that it allows you to hide files in sounds. FTP-
Server: ftp://ftp.hacktic.nl/pub/crypto/macintosh/ (The Netherlands)

59. PGE - Pretty Good Envelope Hides data file into a GIF or JPG file of any size or resolution using a very simple method of appending the message to the
file, and then appending a 4 byte little endian number which points to the start of the message. The encryption used is considered "weak" by the author,
using another encryption method prior to applying PGE is recommended. Download from Version 1.0 (includes
encryption) http://www.rugeley.demon.co.uk/security/encrypt.htm (UK) or version 2.0 (does not include
encryption)http://www.afn.org/~afn21533/rgdprogs.htm (US).

60. PGM Stealth by Timo Rinne and Cirion oy Available at http://www.nic.funet.fi/pub/crypt/steganography/ (Finland) IMAGES: (PGM )

61. PGPn123 A Windows front-end to PGP, which will hide a text file inside text. Basically a PGP shell tool that also includes a steganography option. Two
versions are available: pn123-05.zip (freeware) and an enhanced version pn123e18.zip (shareware). Both may be available
at http://www.stegoarchive.com (US)

62. PicSecret by Andrew Lee (Cortic Software). PicSecret allows users to hide text messages in images. Available for Mac OS X (free) and as a web-interface
online at http://www.picsecret.com

63. PIILO, PILO by Tuomas Aura (now with Microsoft Research). Hides in PGM images

64. PixelTag by Joshua Smith and Barrett Comiskey (previously with MIT Media Lab). Previous address: http://www.media.mit.edu/pixeltag

65. S-Mail by Security Software Development (SSD) Ltd. Previous addresses: Nassau -
BAHAMAS http://www.ssdltd.com http://www.privacysoftware.com/ Versions for DOS 5.0+ and Win32 Hides in EXE and DLL files

66. S-Tools by Andrew Brown - S-Tools hides in a variety of cover media. This software is a good illustration of different versions hiding in different media.
These versions cover hiding in BMP, GIF, WAV, and even on unused floppy disk space. Download: S-Tools 1.0 S-Tools 2.0 S-Tools 3.0 S-Tools 4.0 FTP-
Server: ftp://ftp.funet.fi/pub/crypt/mirrors/idea.sec.dsi.unimi.it/code/ (Finland)

67. Safer v2.0 (kill v1.2, unkill v2.0) by C. Petermann (CpH). Versions available for DOS 5.0+, OpenDOS, Win32, and Amiga operating sytems Hides data on
floppies

68. SandMark watermarking software by Christian Collberg and Gregg Townsend. Previous address: http://www.cs.arizona.edu/sandmark/ Unix/Linux: ( )
Watermarks Java code

69. ScramDisk by Anonymous (AMAN) Author of the program wishes to remain anonymous. ScramDisk support could once be obtained through the
alt.security.scramdisk newsgroup. The author uses the pseudonym AMAN. Information about Scramdisk is hosted by Sam Simpson.
(scramdisk@samsimpson.com) Previous address: http://www.scramdisk.clara.net/ Several products have been derived from Scramdisk. A sourceforge
project is also avilable providing Scramdisk 4 Linux (SD4L) based on this product. Win32 AUDIO: (WAV )

70. Scytale by Patrick Buseine is a Windows PGP interface that includes an option to hide data in .PCX files. Previous
website http://scytale.rever.fr/main.html (France)

71. SGPO (SteganoGifPaletteOrder) by David Glaude and Didier Barzin. Previous contact information: David GLAUDE:
glu@who.net http://www.geocities.com/SiliconValley/Heights/2099/index.htm. Didier BARZIN:
didier@unforgettable.com http://student.ulb.ac.be/~dbarzin/. Written in Java IMAGES: (GIF (palette) )

72. Snow (also variants include !SnowDOS, SnowJava, JSnow By Matthew Kwan is available in both DOS and JAVA executable formats. "snow exploits the
steganographic nature of whitespace. Locating trailing whitespace in text is like finding a polar bear in a snowstorm. And it uses the ICE encryption
algorithm, so the name is thematically consistent." Information and software is available at http://www.darkside.com.au/snow/index.html (Australia)

73. Snowdisk by Scott G. Miller. Previous address: scgmille@indiana.edu Linux software for hiding on unused diskspace. Fills the disk space with the encrypted
contents of and random data.

74. Spam Mimic (spammimic) by David Mckellar. See: http://www.spammimic.com/ for more information Generates spam-like text and fake PGP blocks to
hide data

75. Spyder by Lucas (Luke) Natraj. Command line tool IMAGES: (BMP 8-bit )

76. Stash (Stash-It) by Chris Losinger, Smaller Animals Software, Inc. Previous Contact information: Administrative Contact, Billing Contact: Losinger, Chris
(CL4280) chrisdl@PAGESZ.NET Smaller Animals Software, Inc. 8701 Walkelin Ct Raleigh, NC 27615 919-844-7951 (FAX)
9198447951 http://www.smalleranimals.com Win32 IMAGES: (256-color PCX, BMP / 24-bit BMP, TIFF, PNG, PCX)

77. Stealth A PGP tool for steganography which strips any standard headers off of a PGP encrypted message to make the result look like random noise.
Download from Adam Back's sitehttp://cypherspace.org/adam/stealth/ (UK) Version 2.01b is avilable
at ftp://ftp.hacktic.nl/pub/crypto/steganographic/ (The Netherlands) Versions are also available
at:http://www.nic.funet.fi/pub/crypt/steganography/ (Finland)

78. Stealthencrypt Internet Security Suite by Herb Kraft or Amy Seeberger, Sublimated Software. Previous contact information: 703 Pier Avenue B330
Hermosa Beach, CA 90254http://www.stealthencrypt.com/ Windows IMAGES: (BMP, TIF )

79. Stegano (also WinStegano and steg_win) by Thomas Biel DOS and Windows applications for hiding data in BMP images

80. Steganos - Steganos Security Suite by Fabian Hansmann (Steganos.com) hides data in BMP, VOC, WAV and ASCII files.
See http://www.steganos.com for the latest information. (Germany) Earlier versions of steganos are available
at: ftp://ftp.funet.fi/pub/crypt/mirrors/idea.sec.dsi.unimi.it/code/ (Finland) Steganos 1.4 is a small DOS program Steganos for Windows 95 is an upgrade
version 1.4 The Steganos Security Suite was introduced in version 2.0 Version 3r5 is avilable at ftp://ftp.hacktic.nl/pub/crypto/steganographic/ (The
Netherlands)

81. StegFS (Steganographic File System) by Andrew D. McDonald. Previous


addresses: http://www.mcdonald.org.uk/andrew/ http://ban.joh.cam.ac.uk/~adm36/StegFS Linux

82. Steghide by Stefan Hetzl. http://steghide.sourceforge.net/ Source code is aviailable and several ports are available for different operating systems.
IMAGES: (BMP) AUDIO: (WAV, AU )

83. StegMark (also StegComm and StegSign) by DataMark Technologies (Singapore). Contact information: DataMark Technologies Pte Ltd Suite 106,
Innovation Centre, Block 1, 16 Nanyang Drive Republic of Singapore 637722 Tel: (65)-793-7725 (65)-793-7726 Fax: (65)-793-7790 Email:
support@datamark-tech.com http://www.datamark-tech.com/index.htm Claims to embed in multiple file formats and media types IMAGES: (BMP, JPG,
GIF, TGA, TIFF, PNG ) AUDIO: (MIDI, WAV, AVI, MPEG )

84. Stego - Steganosaurus, Stegosaurus by John Walker - Text-based steganography program to send encrypted messages and files. For more information
and syntax see:http://www.fourmilab.ch/nav/topics/crypto.html (Switzerland) public domain.

85. Stego (Stego v1.0a2) by Romana Machado is a steganography tool that enables you to embed data in Macintosh PICT format files, without changing the
appearance or size of the PICT file. Thus, Stego can be used as an "envelope" to hide a previously encrypted data file in a PICT file, making it much less
likely to be detected. Available at:http://www.nic.funet.fi/pub/crypt/steganography/(Italy) and ftp://ftp.hacktic.nl/pub/crypto/macintosh/ (The
Netherlands)

86. Stegodos also known as Black Wolf's Picture Encoder by Black Wolf. This is a command line tool (actually several) that hide in 256-color screen
captures. The screen captures are 320x200. Available at http://www.nic.funet.fi/pub/crypt/steganography/ (Finland)
and ftp://idea.sec.dsi.unimi.it/security/crypt/cypherpunks/steganography/ (Italy)

87. Stegotif by Giovambattista Pulcini. Previous addresses: http://www.verrando.com/pulcini http://www.geocities.com/SiliconValley/9210 Win32 command
line IMAGES: (TIFF, TGA (LSB 24-bit RGB) )

88. Stegowav by Giovambattista Pulcini Previous addresses: http://www.verrando.com/pulcini http://www.geocities.com/SiliconValley/9210 Command line
tool (WinDOS) AUDIO: (RIFF (8/16 bits) PCM wave (.WAV) )

89. Stegowav by Peter Heist. Previous addresses: heistp@rpi.edu and heistp@voicenet.com Java code AUDIO: (Microsoft WAV )

90. StegParty by Steven E. Hugg. Previous Contact Info: Hamco Software (COMETBUSTERS-DOM) 1249 Turkey Point Rd Edgewater, MD 21037 USS Previous
e-mail hugg@POBOX.COMhttp://www.cometbusters.com/hugg/projects/stegparty.html Unix/Linux Generates text to hide data (not random gibberish)
91. Stext by Ulrich Kuehn. Previous address: ulrich.kuehn@t-online.de Command line application that generates text to hide information

92. SubiText also TextSign Watermark by Compris.com Previous contact information: Compris.com Opelstr. 10 D-67661 Kaiserslautern-Siegelbach Germany
phone: (+49) 06301 - 703340 fax: (+49) 06301 - 703119 E-Mail:mailto:TextSign@compris.com http://www.textsign.com/

93. Suresign (Signum) by Signum Technologies http://www.signumtech.com Windows and MAC versions of the watermarking application. Claims: IMAGES:
(Invisible watermark and visible logo with Photoshop Plug-in ) AUDIO: (WAV files with the Cool Edit Audio Plug-in )

94. SysCop by MediaSec Technologies LLC Previous contact information: MediaSec Technologies LLC 321 South Main Street, Suite 2 Providence, RI 02903 USA
Tel: (401) 453 6363 x 108 Fax: (401) 453 0444 Email: info@mediasec.com http://www.mediasec.com Digital watermarking products for for Windows, Mac,
and Linux Carriers: Images, MPEG-1, MPEG-2

95. Textego by Chirs Huson. Previouis address: http://www.soltec.net/~huson/ TEXT: (substituion cipher that makes text files look like a cross between mad
libs and bad poetry )

96. TextHide (see SubiText)

97. Texto Texto by Kevin Maher is a text steganography program which transforms uuencoded or PGP ascii-armoured ascii data into English sentences. Texto
text files look like something between mad libs and bad poetry, (although they do sometimes contain deep cosmic truths) and should be close enough to
normal english to get past simple-minded mail scanners. FTP-Server:http://www.nic.funet.fi/pub/crypt/steganography/ (Finland)

98. Virtual Steganographic Laboratory (VSL) by Michal Wegrzyn is a graphical block diagramming tool that allows complex using, testing and adjusting of
methods both for image steganography and steganalysis. VSL provides friendly GUI along with modular, plug-in architecture. Available at Sourceforge.

99. VisualCrypto (Visual Cryptography) by Jouko Holopainen . Previous contact information: Purjehtijantie 4 A 10 FIN-90560 Oulu FINLAND
jhol@gnosis.pp.fi as of 1996-05-14 Versions for Windows, MAc, and Linux IMAGES: (Input from PGM (B&W) images and output to Postscript (PS). )

100.Vodka-tonic by lordlsd is a cryptography-steganography hybrid tool. It can hide data into different filetypes and encrypt the information. Available
at http://www.astalavista.com/index.php?section=directory&cmd=detail&id=3181

101.wbStego by Werner Bailer is a steganography to hide data in bitmaps, text files and HTML files. Available
at http://www.8ung.at/wbailer/wbstego/ (Austria)

102.WitnesSoft No longer available. Used to be offered by Aliroo. WitnesSoft contained DocSec - Invisible, scannable label for organizational document
security. PrintAuthentic - Invisible, programmable background for official document authentication. SoftProtect - Built in marking mechanism for software
protection. CopyRight - invisible page marking of for copyright protection of printed intellectual property.

103.Wnstorm - White Noise Storm Wnstorm (White Noise Storm) is a cryptography and steganography software package which you can use to encrypt
and hide files within PCX images. Available athttp://www.nic.funet.fi/pub/crypt/steganography/ (Finland)

104.Xidie Security Suite Xidie is one of the most complete, innovative and complex application in steganography branch. Offer over 50 carrier types
including many new technologies like ADS, Microsoft Office carrier, Registry keys etc. Most of carrier types implemented in Xidie are unique:Tiff and Word,
Excel workbooks, Access databases Registry keys, Microsoft console documents, Event log files Cookies, subtitles, dictionary and PDF documents, Alternate
data streams and attaching method with multiple files carrier. Commercial site: http://www.stegano.ro Technical
specifications:http://web.clicknet.ro/xidie/index.html

105.Z-File (Zfile Camouflage and Encryption System) by INFOSEC Information Security Company, Ltd. (Taiwan) Previous
addresses: http://www.in4sec.com (no longer) http://www.infosec.com.tw(no longer) Win32 application IMAGES: (BMP)

Send comments to nfj(at)jjtc(dot)com.


Copyright, ©1995-2010
http://www.souhttp://www.sourcecodeonline.com/list?
q=source_code_for_image_steganography_project its a ip adress

s0urcecodeonline.com/sources/visual_basic___vb_net/visual_basic.html

Mar 10th, 2009

0
Re: I need help about my steganography project
Did a little research. But I believe what you need to do is to deal with your file as a Binary File. And then you need to Bitshift your data in some kind of a loop to examine it.
Unfortunately, VB6 does not have a bitshift operator. But there are alternatives.

Do a google search. These couple words should give you some good examples.

Bitshift VB6

cs171, Introduction to Programming

Final Project: Steganography Application

200 points

Overview:

People use cryptography to send secret messages to one another without a third

party overseeing the message. Steganography is a type of cryptography in which

the secret message is hidden in a digital picture. Think of all those pixels in an

image and each pixel has three color numbers — there are zillions of numbers

in an image. If you were to change a few of these color numbers the resulting

picture would probably look a lot like the original image; in fact, most people

probably couldn’t tell that you had changed the image at all. Steganography works

by changing a few pixel color values; we will use selected pixel values to represent

characters instead of a color value. Ofcourse, the resulting image will still look

mostly like the original except that a few tiny ”blips” might seem a little out of

place if you look very closely. We can then send the image to a buddy and they can

extract the message if they know which pixels to decode.

In this assignment you will be writing a java application that will enable you to

exchange secret messages with another person.

Skills covered in this assignment:

Here are some of the skills you will need to learn in order to complete this

assignment:

• Loading and saving bitmap files.

• Bit manipulation operations.

Requirements
• Project is to be submitted on email by 11:30am on Monday, May 1.

1• You are to create an application called Steganography.java. All your

code will be in this file. This is what you will submit on email.

• Your project is to work with the standard (original) Picture.java class.

You shouldn’t need any changes to this class in order to make your project

work. You will not be submitting a Picture.java file. Instead, I will use

my copy to run your program.

• There is a file Secret.bmp on the class web page. Encoded in this file is

a question. Use your program to decode the message. Answer the question

(in 255 chars or less). Then submit back to me your response encoded in a

different bmp picture. You are to copy this bmp file in your file on the shared

drive (before 11:30am, May 1). Of course, make sure your own program can

decode the response you put in this picture; that way you can be sure that my

program can decode the response too.

Bitmap Files

• First you will need to read your picture as a jpg and then save it in 24-bit bmp

format. You will need to use bmp files for this assignment because jpg’s are

”lossy” meaning that what you write to the file may be changed slightly so

that the resulting image can be stored more efficiently. Thus jpg will not

work for steganography because jpgs will change the secret message when

storing the file to disk. Here are the commands to save your file. You can

give it the same name except be sure to put a .bmp file extension on the end.

(For example, I loaded ”Matt.jpg” and then saved ”Matt.bmp”).

> Picture p = new Picture(FileChooser.pickAFile());

> p = p.halve().halve();

> p.saveBMP(FileChooser.pickSaveFile());
• There is also a loadBMP method. You can probably guess how this works.

• Note that I reduced my image to

original size because bmp files take a

lot of memory. You will run in to less trouble if your image is smaller (say

100x100 or less).

Bit Manipulation

2• You will need to be able to manipulate the bits stored in numbers. There are

three basic bit manipulation operations: and, or, and shift. You will need all

three.

• See the BitExample.java example to see how to use these different

operations.

Interaction

• Prompt the user if they want to encode or decode a message.

• Use the FileChooser dialog to prompt the user for an input file.

• If encode, prompt the user for an input message. Encode the message into

the picture (details below). Then use the FileChooser dialog to prompt the

user for an output file. Save the new picture/message in this file (using bmp

format).

• If decode, extract the message from the file. Print the message.

Encoding/Decoding Method

• You can extract the pixels of your target picture in one big array using the

textttgetPixels() method.

• Use the first pixel (at spot 0) to hide the length of your message (number of

characters). You will limit yourself to messages that are between 0 and 255
characters long.

• After that use every eleventh pixel to hide characters in your message. Start

at pixel 11, then pixel 22, and so on until you hide all characters in your

message.

• Every thing that you need to hide in a pixel is 8-bits long. The length (in the

first pixel) is a byte. You can typecast all the unicode chars to bytes as well.

• Use the method below to hide each byte in an appropriate pixel.

3Hiding Method

The problem with changing the red values in our encode/decode steps, is that

these often cause quite visible changes in the resulting image. This is especially

true if the pixels that are being changed are part of a large section of uniformly

colored pixels – the ”dots” stand out and are noticeable. As an option, we can

change only the lower order bits of each pixel color (red, blue, and green). This

will make subtle changes to each pixel’s color and will not be as evident.

Remember that each pixel has three bytes: one byte for red, blue and green

colors. Each byte has 8 bits to encode a number between 0 and 255. When we

swap out the red color byte for a character, it is possible that we are changing the

redness of that pixel by quite a bit. For example, we might have had a pixel with

values of (225, 100, 100) which has lots of red, some green and some blue – this is

basically a reddish pixel with a slight bit of pink color to it. Now suppose we are

to store the character ”a” in the red part of this pixel. An ”a” is encoded as decimal

number 97 so our new pixel becomes (97, 100, 100). Now we have equal parts of

all three colors to produce a dark grey pixel. This dark grey is noticeably different

than the dark pink we had before; it will definitely stand out in the image especially

if the other nearby pixels are all dark pink.

We want a way to encode our message without making such drastic changes to
the colors in the original image. If we only change the lowest bits of each pixel,

then the numeric values can only change by a small percentage. For example,

suppose we only change the last three bits (lowest three bits) – these are the bits

that determine the ”ones place”, the ”twos place” and the ”fours place”. We can

only alter the original pixel color value by ±7. Let us think of our original pixel as

a bits:

(r7 r6 r5 r4 r3 r2 r1 r0, g7 g6 g5 g4 g3 g2 g1 g0, b7 b6 b5 b4 b3 b2 b1 b0).

And our character (byte) as some bits:

c7 c6 c5 c4 c3 c2 c1 c0.

Then we can place three of these character bits in the lowest red pixel, three

more in the lowest green pixel, and the last two in the lowest blue pixel as follows:

4(r7 r6 r5 r4 r3 c7 c6 c5, g7 g6 g5 g4 g3 c4 c3 c2, b7 b6 b5 b4 b3 b2 c1 c0).

If we had done this to the example of pixel (225, 100, 100) with character ”a”,

we obtain:

original pixel = ( 11100001, 01100100, 01100100 )

”a” = 01100001

new pixel = ( 11100011, 01100000, 01100101 )

new pixel = ( 227, 96, 101 )

Notice the new pixel of (227, 96, 101) is almost the same value as the old pixel

of (225, 100, 100). There will be no noticeable color difference in the image! To

retrieve the message, you simply extract the appropriate pixels from the rgb values

to reconstruct the secret character.

To accomplish this, you will need to be handy with the ”logical and” and ”logical or”
operators and also the ”shifting” operator. Obtain a java reference book to

research these operations. You might want to test them out on a small program first

or on the Dr. Java command line.

5
cs171, Introduction to Programming

Final Project: Steganography Application

200 points

Overview:

People use cryptography to send secret messages to one another without a third

party overseeing the message. Steganography is a type of cryptography in which

the secret message is hidden in a digital picture. Think of all those pixels in an

image and each pixel has three color numbers — there are zillions of numbers

in an image. If you were to change a few of these color numbers the resulting

picture would probably look a lot like the original image; in fact, most people

probably couldn’t tell that you had changed the image at all. Steganography works

by changing a few pixel color values; we will use selected pixel values to represent

characters instead of a color value. Ofcourse, the resulting image will still look

mostly like the original except that a few tiny ”blips” might seem a little out of

place if you look very closely. We can then send the image to a buddy and they can

extract the message if they know which pixels to decode.

In this assignment you will be writing a java application that will enable you to

exchange secret messages with another person.

Skills covered in this assignment:

Here are some of the skills you will need to learn in order to complete this

assignment:

• Loading and saving bitmap files.

• Bit manipulation operations.

Requirements

• Project is to be submitted on email by 11:30am on Monday, May 1.

1• You are to create an application called Steganography.java. All your


code will be in this file. This is what you will submit on email.

• Your project is to work with the standard (original) Picture.java class.

You shouldn’t need any changes to this class in order to make your project

work. You will not be submitting a Picture.java file. Instead, I will use

my copy to run your program.

• There is a file Secret.bmp on the class web page. Encoded in this file is

a question. Use your program to decode the message. Answer the question

(in 255 chars or less). Then submit back to me your response encoded in a

different bmp picture. You are to copy this bmp file in your file on the shared

drive (before 11:30am, May 1). Of course, make sure your own program can

decode the response you put in this picture; that way you can be sure that my

program can decode the response too.

Bitmap Files

• First you will need to read your picture as a jpg and then save it in 24-bit bmp

format. You will need to use bmp files for this assignment because jpg’s are

”lossy” meaning that what you write to the file may be changed slightly so

that the resulting image can be stored more efficiently. Thus jpg will not

work for steganography because jpgs will change the secret message when

storing the file to disk. Here are the commands to save your file. You can

give it the same name except be sure to put a .bmp file extension on the end.

(For example, I loaded ”Matt.jpg” and then saved ”Matt.bmp”).

> Picture p = new Picture(FileChooser.pickAFile());

> p = p.halve().halve();

> p.saveBMP(FileChooser.pickSaveFile());

• There is also a loadBMP method. You can probably guess how this works.

• Note that I reduced my image to


1

original size because bmp files take a

lot of memory. You will run in to less trouble if your image is smaller (say

100x100 or less).

Bit Manipulation

2• You will need to be able to manipulate the bits stored in numbers. There are

three basic bit manipulation operations: and, or, and shift. You will need all

three.

• See the BitExample.java example to see how to use these different

operations.

Interaction

• Prompt the user if they want to encode or decode a message.

• Use the FileChooser dialog to prompt the user for an input file.

• If encode, prompt the user for an input message. Encode the message into

the picture (details below). Then use the FileChooser dialog to prompt the

user for an output file. Save the new picture/message in this file (using bmp

format).

• If decode, extract the message from the file. Print the message.

Encoding/Decoding Method

• You can extract the pixels of your target picture in one big array using the

textttgetPixels() method.

• Use the first pixel (at spot 0) to hide the length of your message (number of

characters). You will limit yourself to messages that are between 0 and 255

characters long.
• After that use every eleventh pixel to hide characters in your message. Start

at pixel 11, then pixel 22, and so on until you hide all characters in your

message.

• Every thing that you need to hide in a pixel is 8-bits long. The length (in the

first pixel) is a byte. You can typecast all the unicode chars to bytes as well.

• Use the method below to hide each byte in an appropriate pixel.

3Hiding Method

The problem with changing the red values in our encode/decode steps, is that

these often cause quite visible changes in the resulting image. This is especially

true if the pixels that are being changed are part of a large section of uniformly

colored pixels – the ”dots” stand out and are noticeable. As an option, we can

change only the lower order bits of each pixel color (red, blue, and green). This

will make subtle changes to each pixel’s color and will not be as evident.

Remember that each pixel has three bytes: one byte for red, blue and green

colors. Each byte has 8 bits to encode a number between 0 and 255. When we

swap out the red color byte for a character, it is possible that we are changing the

redness of that pixel by quite a bit. For example, we might have had a pixel with

values of (225, 100, 100) which has lots of red, some green and some blue – this is

basically a reddish pixel with a slight bit of pink color to it. Now suppose we are

to store the character ”a” in the red part of this pixel. An ”a” is encoded as decimal

number 97 so our new pixel becomes (97, 100, 100). Now we have equal parts of

all three colors to produce a dark grey pixel. This dark grey is noticeably different

than the dark pink we had before; it will definitely stand out in the image especially

if the other nearby pixels are all dark pink.

We want a way to encode our message without making such drastic changes to

the colors in the original image. If we only change the lowest bits of each pixel,
then the numeric values can only change by a small percentage. For example,

suppose we only change the last three bits (lowest three bits) – these are the bits

that determine the ”ones place”, the ”twos place” and the ”fours place”. We can

only alter the original pixel color value by ±7. Let us think of our original pixel as

a bits:

(r7 r6 r5 r4 r3 r2 r1 r0, g7 g6 g5 g4 g3 g2 g1 g0, b7 b6 b5 b4 b3 b2 b1 b0).

And our character (byte) as some bits:

c7 c6 c5 c4 c3 c2 c1 c0.

Then we can place three of these character bits in the lowest red pixel, three

more in the lowest green pixel, and the last two in the lowest blue pixel as follows:

4(r7 r6 r5 r4 r3 c7 c6 c5, g7 g6 g5 g4 g3 c4 c3 c2, b7 b6 b5 b4 b3 b2 c1 c0).

If we had done this to the example of pixel (225, 100, 100) with character ”a”,

we obtain:

original pixel = ( 11100001, 01100100, 01100100 )

”a” = 01100001

new pixel = ( 11100011, 01100000, 01100101 )

new pixel = ( 227, 96, 101 )

Notice the new pixel of (227, 96, 101) is almost the same value as the old pixel

of (225, 100, 100). There will be no noticeable color difference in the image! To

retrieve the message, you simply extract the appropriate pixels from the rgb values

to reconstruct the secret character.

To accomplish this, you will need to be handy with the ”logical and” and ”logical or”
operators and also the ”shifting” operator. Obtain a java reference book to

research these operations. You might want to test them out on a small program first

or on the Dr. Java command line.

5
teganography is the art of hiding the fact that communication is taking place, by hiding information in other information. This project
developed for hiding information in any image file. The scope of the project is implementation of steganography tools for hiding inform
includes any type of information file and image files and the path where the user wants to save Image and extruded file. .

You can free download all the project documentation, project source code, project executable files, database from download link. Co
well commented for your reference, however if you want any clarification you can post your query to p2p forum.

Need more projects, click here to get more than 500 unique academic project idea in different programming languages. Download th
concept, abstract, SRS, source code to complete project for your college submission.

Abstract
Steganography is the art of hiding the fact that communication is taking place, by hiding information in other information. Many differ
file formats can be used, but digital images are the most popular because of their frequency on the internet. For hiding secret informa
images, there exists a large variety of steganography techniques some are more complex than others and all of them have respective
and weak points. Different applications may require absolute invisibility of the secret information, while others require a large secret m
to be hidden. This project report intends to give an overview of image steganography, its uses and techniques. It also attempts to ide
requirements of a good steganography algorithm and briefly reflects on which steganographic techniques are more suitable for which
applications..

Steganography is the practice of hiding private or sensitive information within something that appears to be nothing out to the usual.
Steganography is often confused with cryptology because the two are similar in the way that they both are used to protect important
information. The difference between two is that steganography involves hiding information so it appears that no information is hidden
person or persons views the object that the information is hidden inside of he or she will have no idea that there is any hidden inform
therefore the person will not attempt to decrypt the information.
What steganography essentially does is exploit human perception, human senses are not trained to look for files that have information
them, although this software is available that can do what is called Steganography. The most common use of steganography is to hide
inside another file..
Project Scope:
This project is developed for hiding information in any image file. The scope of the project is implementation of steganography tools fo
information includes any type of information file and image files and the path where the user wants to save Image and extruded file.

Methodology:
User needs to run the application. The user has two tab options – encrypt and decrypt. If user select encrypt, application give the scre
select image file, information file and option to save the image file. If user select decrypt, application gives the screen to select only im
and ask path where user want to save the secrete file.
This project has two methods – Encrypt and Decrypt.
In encryption the secrete information is hiding in with any type of image file.
Decryption is getting the secrete information from image file.

Graphical Representation
The graphical representation of Steganography system is as follows:
System Analysis & Design

Steganography system requires any type of image file and the information or message that is to be hidden. It has two modules encry
decrypt. Microsoft .Net framework prepares a huge amount of tool and options for programmers that they simples programming. One
tools for pictures and images is auto-converting most types of pictures to BMP format. I used this tool in this software called “Stegano
that is written in C#.Net language and you can use this software to hide your information in any type of pictures without any converti
format to BMP (software converts inside it).
The algorithm used for Encryption and Decryption in this application provides using several layers lieu of using only LSB layer of imag
data starts from last layer (8st or LSB layer); because significant of this layer is least and every upper layer has doubled significant fr
down layer. So every step we go to upper layer image quality decreases and image retouching transpires.

The encrypt module is used to hide information into the image; no one can see that information or file. This module requires any typ
image and message and gives the only one image file in destination.

The decrypt module is used to get the hidden information in an image file. It take the image file as an output, and give two file at de
folder, one is the same image file and another is the message file that is hidden it that.
Software used
• Front End : C# - .Net Framework 3.5
Namespace and Base Classes used in this project are
○ System.Drawing
○ System.IO
○ System.Deployment
○ System.Xml

○ System.Data

Download the project documentation, source code and project files.

Siz
Download Type Download File e in No of times download
KB
159
1. Project Synopsis 636
4
425
2. Project Report 672
4

3. Project Source Code 135 644

For any query and help regarding this project visit.


http://www.programmer2programmer.net/forums/forum_main.aspx?forum_id=6

Steganography - A new technique to hide information within image file - Free download of Readymade Complete Academic Live
(C) Atanu Maity, 2006-2010
Project of Steganography, Image Encryption written in C#, .NET Framework 3.5. Readymade Source Code for final year college student, project
submission of BE, BSC-IT, BCA, MCA, MBA, IGNOU, SMU, DOEACC. Download Includes Project Abstract Synopsis, Project Report, Demo, Flow Chart,
DFD, Data Dictionary, Requirement Analysis, SRS, Flow Chart.

You might also like