Index ] [ Anonymity ] [ Privacy ] [ Security ] [ Search ] [ Feedback ] [ Index ] [ Anonymity ] [ Privacy ] [ Security ] [ Search ] [ Feedback ]

Privacy: Steganography

Steganography is the art of hiding signals inside other signals. This basically comes down to using unnecessary bits in an innocent file to store your sensitive data. The techniques used make it impossible to detect that there is anything inside the innocent file, but the intended recipient can obtain the hidden data.

This way, you not only hide the message itself, but also the fact that you are sending this message.


Disclaimer: The programs listed in this document have not been tested by me, and I cannot guarantee that they will work on your system without problems. Use at your own risk!

[=] Steganography homepage
[=] Steganography paper (By Neil F. Johnson)
A more extensive introduction to steganography, the principles behind it and how it can be used. Also has a review of most of the programs listed below.
[*] Hide and Seek
This DOS program can store any type of data inside a GIF image.
[*] StegoDos
This DOS based picture encoder consists of a group of programs designed to let you capture a picture, encode a message in it, and display it so that it may be captured again into another format with a third-party program, then recapture it and decode the message previously placed inside it.
[*] S-Tools
This MS Windows program can hide data inside GIF, WAV and BMP files, and also on the unused space on floppy disks.
[*] Stego
This Macintosh program can hide data in Macintosh PICT type files.
[=] MandelSteg
Allows you to hide arbitrary data in a Mandelbrot image.
[=] Steganos for Windows 95
Steganos is a Wizard-style Windows 95 application that can hide and/or encrypt files. It can hide files inside BMP, DIB, VOC, WAV, ASCII, and HTML files.
[+] PGP encryption
Even though the file is hidden inside something else, it may still be possible to recover it from that file by someone else. In such a case, you should encrypt the data first. This makes it a lot harder for this other person to determine whether he has really extracted the file you put in the image.
[+] Security: File wiping
A normal "delete" does not actually erase files. The data itself remains on the disk, it's just not part of a file anymore. By using a wiper, the data is replaced with random junk first. This prevents people with undelete utilities to get your erased files back.

HTML 3.2 Checked!
Last modified: 22 Jan 2000
Author: Arnoud "Galactus" Engelfriet
This document was generated with Orb v1.3 for OS/2.