Cryptography Reference
In-Depth Information
http://diit.sourceforge.net/ The Digital Invisible Ink Toolkit written
by Kathryn Hempstalk includes several algorithms for encod-
ing information and several algorithms for analyzing the results
to look for steganography. The hiding algorithms all work on
the least significant bits. The more sophisticated algorithms
use Sobel filters or Laplace filters to flag the best pixels for hid-
ing information. These tend to flag the edges between objects
where the intensity of the image changes quickly.
http://web.clicknet.ro/xidie/stegano.html The Xidie Security Suite
by Laic Aurelian compresses, encrypts and embeds informa-
tion in a wide variety of files including most image and sound
formats. It is free for non-commercial use and a commerical
license is available.
http://www.hermetic.ch/hst/hst.htm Hermetic Stego will hide in-
formation in BMP files. For Windows.
http://www.heinz-repp.onlinehome.de/Hide4PGP.htm Hide4PGP
by Heinz Repp will hide information in the least significant bits
of BMP and WAV files. The source and versions for Windows
and Linux are available.
http://www.fourmilab.ch/stego Steganosaurus, from John Walker,
is a C-based program that uses a dictionary to turn bits into
gibberish. [Wal94]
ftp://ftp.hacktic.nl/pub/crypto/macintosh/ Paranoid, by NathanMar-
iels, will encrypt information and hide it in sound files.
http://cypherspace.org/adam/stealth/ PGP Stealth, fromAdamBack,
will strip off all of the headers from PGP files, producing some-
thing that should be random.
http://www.nic.funet.fi/pub/crypt/steganography/ Tex to , by Kev in
Maher, is an text steganography program that uses some basic
grammars. [Mah95]
http://www.stego.com/ Romana Machado distributed the Java ver-
sion of her Stego and EzStego software from here. This cross-
platform tool hides information in the least significant bit of
an image after the colors in the image are sorted. This usually
works quite well, but there can be some inconsistencies. The
software was distributed with the GNU Public License.
http://wwwrn.inf.tu-dresden.de/ westfeld/f5.html The F5 software
used for hiding information in JPEG images includes a number
Search WWH ::




Custom Search