[ Index ]
[ Anonymity ]
[ Privacy ]
[ Security ]
[ Search ]
[ Feedback ]
Privacy: Steganography
Steganography is the art of hiding signals inside other signals.
This basically comes down to using unnecessary bits in an innocent file
to store your sensitive data. The techniques used make it impossible to
detect that there is anything inside the innocent file, but the
intended recipient can obtain the hidden data.
This way, you not only hide the message itself, but also the fact that
you are sending this message.
Disclaimer: The programs listed in this document have not been
tested by me, and I cannot guarantee that they will work on your system
without problems. Use at your own risk!
-
Steganography homepage
-
Steganography paper (By Neil F. Johnson)
- A more extensive introduction to steganography, the principles behind
it and how it can be used. Also has a review of most of the programs
listed below.
-
Hide and Seek
- This DOS program can store any type of data inside a GIF image.
-
StegoDos
- This DOS based picture encoder consists of a group of programs designed
to let you capture a picture, encode a message in it, and display it so that
it may be captured again into another format with a third-party program,
then recapture it and decode the message previously placed inside it.
-
S-Tools
- This MS Windows program can hide data inside GIF, WAV and BMP files, and also on the
unused space on floppy disks.
-
Stego
- This Macintosh program can hide data in Macintosh PICT type files.
-
MandelSteg
- Allows you to hide arbitrary data in a Mandelbrot image.
-
Steganos for Windows 95
- Steganos is a Wizard-style Windows 95 application that can hide and/or
encrypt files. It can hide files inside BMP, DIB, VOC, WAV, ASCII, and HTML
files.
-
PGP encryption
- Even though the file is hidden inside something else, it may still be possible to
recover it from that file by someone else. In such a case, you should encrypt the
data first. This makes it a lot harder for this other person to determine whether
he has really extracted the file you put in the image.
-
Security: File wiping
- A normal "delete" does not actually erase files. The data itself
remains on the disk, it's just not part of a file anymore. By using a
wiper, the data is replaced with random junk first. This prevents
people with undelete utilities to get your erased files back.
Last modified: 22 Jan 2000
Author: Arnoud "Galactus" Engelfriet
Comments: galactus@stack.nl
This document was generated with Orb v1.3 for OS/2.