Neil F. Johnson. Steganography. Technical Report. November 1995.

 [Table of Contents]  [previous]  [next]
Next Section: 3.3 Software Evaluation

3.2 Evaluation Method

Various steganographic software packages were explored. The evaluation process was to determine limitations and flexibility of the software readily available to the public.

Message and container files were selected before testing. This proved to be a problem with some packages due to limitations of the software. The images selected had to be altered to fit into the constraints of the software and other containers were used. In all, a total of 25 files were used as containers (much more than I have room to discuss).

The files used for evaluation included two "message" files and two "container" files. The "message" files are those to be hidden in the innocent looking "container" files.


 [Table of Contents]  [previous]  [next]
Next Section: 3.3 Software Evaluation


|JJTC Home |Neil |Steganography |Steganography Tools |Publications |
 

Copyright, ©1995-2009 Neil F. Johnson. All Rights Reserved. Send comments to nfj(at)jjtc(dot)com.