(Page 3 of 4)   < Prev  1 2 3 4  Next >

Category: Cryptography » Steganography

MP3Stego
Added 2001-10-22
by Fabien A. P. Petitcolas, fapp2@cl.cam.ac.uk
MP3Stego will hide information in MP3 files during the compression process. The data is first compressed, encrypted and then hidden in the MP3 bit stream. Although MP3Stego has been written with steganographic applications in mind it might be used as a copyright marking system for MP3 files (weak but still much better than the MPEG copyright flag defined by the standard). Any opponent can uncompress the bit stream and recompress it; this will delete the hidden information -- actually this is the only attack we know yet -- but at the expense of severe quality loss.

Steganography Tools 4
Added 2001-10-22
by Andrew Brown, a.brown@nexor.co.uk
Steganography Tools 4 encrypts the data with IDEA, MPJ2, DES, 3DES and NSEA in CBC, ECB, CFB, OFB and PCBC modes and hides it inside graphics (by modifying the LSBs of BMP files), digital audio (WAV files) or unused sectors of HD floppies. The embedded message is usually very small.

NiceText
Added 2001-10-22
by Dr. George Davida and Mark T. Chapman, markc@ctgi.net
NICETEXT is a package that converts any file into pseudo-natural-language text. It also has the ability to recover the original file from the text.

Steganos II Security Suite
Added 2001-10-22
by Demcom, info@demcom.com
Steganos II encrypts all kinds of files and hides them within unsuspicious graphic-, sound-, text-, or HTML-files. Proven export restricted algorithms are extended by new technologies.

Black Wolf's Picture Encoder
Added 2001-10-22
by Black Wolf
Black Wolf's Picture Encoder is a set of DOS programs that encodes messages into GIF or PCX images. It works only with 320x200x256 pictures.

Stegonosaurus
Added 2001-10-22
by John Walker
Stegonosaurus is a Unix program that will convert any binary file into nonsense text, but which statistically resembles text in the language of the dictionary supplied.

Snow
Added 2001-10-22
by Matthew Kwan, mkwan@cs.mu.oz.au
Snow is a program for concealing messages in text files by appending tabs and spaces on the end of lines, and for extracting messages from files containing hidden messages. Tabs and spaces are invisible to most text viewers, hence the steganographic nature of this encoding scheme.

FFEncode and FFDecode
Added 2001-10-22
by
FFEncode is an interesting little DOS program that "hides" a file in a text file by using a "morse code" of NULL chararcters. Unpack the zip file and type FFENCODE or FFDECODE at the DOS prompt for the simple command line parameters.

Hide4PGP
Added 2001-10-22
by Heinz Repp, 100434.2106@compuserve.com
A steganographic program that hides data within 8 or 24 bit BMP files, 8 or 16 bit WAV & 8 bit VOC files.

JSteg shell
Added 2001-10-22
by korejwa@tiac.net
JSteg Shell is a Win95/98/NT interface to run JSteg DOS, a program by Derek Upham which hides data in the ever popular JPG image format. Version 1.0 has a number of new improvements, including 40 bit RC4 encrytion, determination of the amount of data a JPG can hide beforehand, and user-selectable JPG options (ie. degree of compression). JSteg Shell has a slick, easy to use interface that makes using JSteg DOS a snap. Don't worry about downloading the DOS executables as Jsteg Shell comes with them, and the installer takes care of all of the setup details. The distribution comes with the necessary VB v4 runtimes, so the file is quite large (3.9 MB). None the less, it is worth the download time for those those who have been waiting for easy to use JPG stego!

Search Tools
Keyword:
Platform:
Category:
Browse by category
Auditing
Log Analysis, Host, Passwords, Network, File Integrity, PSTN, Forensics, Backdoors, Source Code
Sniffers
Recovery
Passwords
Utilities
Passwords, Filesystem, Network, System, Compiler, Log Management, Usage Monitoring, Email
Authentication
One Time Passwords, User Authentication, Password Management, Web, Server, Certificates, Tokens
Intrusion Detection
Network, Host, Web, Evasion
Access Control
Network, Firewall, user privileges, RPC, Bootup, File System, Applications, Mandatory Access Control, Server, X-Windows, ACLs, Privileges
Replacement
Libraries, Applications
Programming
Libraries
Cryptography
Libraries, Random Numbers, Traffic Encryption, Data Encryption, Cryptoanalysis, Steganography, E-mail
Network Monitoring
Policy Enforcement
Web Access, Email
System Security Management
Accounts, Console, Windows NT, Firewall, Configuration, Filesystem, Linux, Solaris, Monitoring
Network Utilities
Tunneling, Miscellaneous, Monitoring
Rootkits
Secure Deletion
Hardening
Linux, FreeBSD, NT, Solaris
Hostile Code
Detection, Removal, Sandbox


 

Privacy Statement
Copyright 2010, SecurityFocus