

Exhaustive directory of steganography software by Dr.Rocha, Anderson Goldenstein, Siome, Steganography and Steganalysis: past, present, and future (PDF), First IEEE Workitorial on Vision of the Unseen (WVU'08), retrieved 8 March 2017.Transactions on Data Hiding and Multimedia Security III. 'Constructing good covering codes for applications in Steganography' (PDF). Proceedings of the 10th Conference on USENIX Security Symposium. 'Defending against statistical steganalysis'. 'Hide and Seek: An Introduction to Steganography' (PDF). 'Performance study of common image steganography and steganalysis techniques' (PDF). Symmetric and asymmetric key cryptography, runs on Win/Linux/Macįree online tool using AES CBC 256 bit encryption with PBKDF2 key derivationĭifferent hiding methods (LSB, LSB Matching, SLSB), Open source XT for Total Commander, LZMA compression, PRNG-based masking and distribution
GOOGLE OUTGUESS PORTABLE
Portable freeware Windows (based on Outguess for Linux) Using Least Significant Bit for data hiding.Ģ56-bit multi-encryption, Carrier chains, Multi-layered obfuscation Steganographic watermark hidden in JPEG photos for Mac, Win, iOS and Androidįreemium interface on English, Russian and Ukrainian AES and TripleDES encryption. RSD algorithm implemented, plugin for Total Commander (StegoTC G2) RSD mode (RNG-based random data distribution), AES encryption supported Tools comparison Tools comparison (alphabetical order) Program Ancillary data and metadata substitution.Generation (suspicious because of the traceability of the generated carriers).Injection (suspicious because of the content-unrelated file size increment).Processing algorithms include: Outguess Software Different file formats are modified in different ways, in order to covertly insert hidden data inside them. The carrier engine is the core of any steganography tool.
