I used the full path to my stegwrite tools, since they’re not in my $PATH. Here I redirect the standard input (the output of cat command) into the stegwrite tool and specify an existing and desired output picture object. #Outguess hide text in photos software#The software supports 24bpp bitmap images, and runs on Linux and FreeBSD operating systems.Ĭat pass.txt | /usr/local/stegotools-0.4b/stegwrite grill.jpg summer-grill.jpg 1 The latest version of stegtools, 0.4b, was released in the middle of 2005. Stegtools is a pair of command-line tools for reading and writing hidden information. That’s because Steghide automatically knows what the file name was that was inserted and extracts the file with the same name. Note that when extracting we didn’t specify any output file. #Outguess hide text in photos password#You’ll be asked for a password, and the utility will extract the pass.txt only if your password (secret key) is correct. To extract the pass.txt file from the summer-grill.jpg picture, use this Steghide command: ~$ steghide embed -cf grill.jpg -sf summer-grill.jpg -ef pass.txt -p summer Let’s use the same scenario from our previous example. Steghide runs under both Linux and Windows. The default encryption algorithm is Rijndael with a key size of 128 bits, which is basically AES (Advanced Encryption Standard), but you can choose from many other encryption algorithms as well. The latest version of Steghide, 0.5.1, has been available since October 2003, and supports hiding sensitive information inside BMP and JPEG image formats as well as in AU and WAV audio formats. Steghide is another program you can use to hide sensitive data inside image and audio files. If you don’t specify the -k option and provide the key, OutGuess will extract the pass.txt file, but it won’t be readable. ~$ outguess -k summer -r summer-grill.jpg pass.txt As long as he knows the secret key I used for the encryption, he can run the command: When my coworker receives the picture, he needs to extract the information from the file. Anyone who sees the picture won’t notice anything strange, since the data in the image object is not visible to the human eye. Now I have an image named summer-grill.jpg that holds my production server’s root password, and I can mail it to my coworker. If you leave it off, however, anyone who knows there’s a file buried in the image can extract the output file. You don’t need to use the -k option to encrypt the sensitive data with a secret key. ~$ outguess -k summer -d pass.txt grill.jpg summer-grill.jpg I can start by putting the password in a pass.txt file, then encrypt it with a secret key (“summer” - shh, don’t tell anyone) and mix the encrypted version with an image called grill.jpg. Suppose I want to securely send a coworker a root password for a production server. #Outguess hide text in photos mac os#OutGuess can be used on Linux, *BSD, Solaris, AIX, HP-UX, Mac OS X, and Windows. The latest version, 0.2, was released in late 2001 and supports inserting objects into PPM, PNM, and JPEG image formats. OutGuess is console-based universal steganographic tool that can hide information inside picture objects. Most of these programs and tools are available in package repositories for different Linux distributions. Here’s a look at some useful tools that you can use to hide and unveil sensitive information inside an object. For extra security, you can encrypt the text file before you merge it. The resulting file looks and sounds the same - only the size of the file is slightly changed. With steganography, a plain text file is merged with a picture or sound file. Instead of these approaches, consider using steganography, a method for hiding sensitive information inside some other object, typically a JPEG picture or a sound file. A piece of paper hidden somewhere is not a good idea, because after you forget where did you put it, someone else will find it and abuse it. Ever find yourself with too many passwords to remember and no idea where to keep them so that only you can find the password list? Creating a password.txt file in your root directory is out of the question, as is a password-protected file.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |