Neil F. Johnson. Steganography. Technical Report. November 1995.

 [Table of Contents]  [previous]  [next]
Next Section: 3.3.1 Hide and Seek

The image of Shakespeare is too small to contain M2, but M1 could be embedded without any degradation of the image. For the most part, all the software tested could handle the 518 byte plain- text message, however, only two could handle the image labeled M2. Of the two, only one software package could reliably handle 24-bit images and other formats consistently: S-Tools by Andy Brown.

Next, an attempt was made to embed messages M1 and M2 using each software package. If the software could not handle processing these containers (C1 and C2), other containers were tried. All the software could embed M1 into some container. These files were reviewed before and after applying steganographic methods.

3.3 Software Evaluation

The following software packages were reviewed with respect to steganographic manipulation of images: Hide and Seek v4.1, StegoDos v0.90a, White Noise Storm, and S-Tools for Windows v3.00. Nearly all the authors encourage encrypting messages before embedding them in images as an added layer of protection and reviewing the images after embedding data. Even with the most reliable software tested, there may be some unexpected results.


 [Table of Contents]  [previous]  [next]
Next Section: 3.3.1 Hide and Seek


|JJTC Home |Neil |Steganography |Steganography Tools |Publications |
 

Copyright, ©1995-2009 Neil F. Johnson. All Rights Reserved. Send comments to nfj(at)jjtc(dot)com.