Skip to content

Divinemonk/steganography

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

2 Commits
 
 
 
 

Repository files navigation

steganography

Method Name Medium Hiding/Encrypting Process Unhiding/Decrypting Process Description
1. LSB Substitution Images Use a tool like OpenPuff, Steghide, or ImageMagick to hide binary data by replacing LSBs. Use the same tool to extract the hidden message from the stego image. Replace the least significant bit (LSB) of each pixel with the message bit to be hidden, causing minimal visual changes.
2. Text-Based Steganography Text Use a Python script to embed data within the text using encoding schemes (e.g., Base64). Use the same script to extract the hidden data from the stego text. Hide the message within the text by modifying certain characters or words based on encoding schemes.
3. Audio LSB Modification Audio Utilize tools like DeepSound or StegHide to hide binary data by modifying the LSBs of audio samples. Use the same tools to extract the hidden data from the stego audio. Modify the least significant bit (LSB) of audio samples to embed the message, maintaining audio quality.
4. Video LSB Modification Video Use FFmpeg or OpenPuff to hide data by altering the LSBs of video frames. Employ FFmpeg or OpenPuff to extract the hidden data from the stego video. Similar to audio LSB modification, but applied to video frames, allowing for higher capacity steganography.
5. Spatial Domain Techniques Images Use LSB Matching or random pixel modification in tools like StegoMagic or OpenStego. Use the same tools to recover the hidden data from the stego image. Alter pixel values directly in the cover image to embed the message, achieving minimal visual changes.
6. Transform Domain Techniques Images Utilize tools like OutGuess or StegHide to embed data in the frequency domain using DCT or DWT. Use the same tools to extract the hidden data from the stego image. Convert the image into the frequency domain using DCT or DWT and embed the message in specific coefficients for robustness.
7. Visual Cryptography Images Use VSL (Visual Secret Sharing Scheme) tools like "vss" to divide the secret message into shares. Use the same tool to combine the shares and reveal the original message. Divide the secret message into shares or "layers" of binary data, and combining shares reveals the hidden message.
8. Audio Spectrogram Steganography Audio Use Sonic Visualizer or StegSpect to embed data in the spectrogram of audio. Use the same tools to extract the hidden data from the stego audio. Convert audio to its spectrogram representation, and embed data in the spectrogram by modifying specific frequency ranges.
9. Hide Data in File Metadata Images/Audio/Video Use ExifTool or FFmpeg to embed data in the metadata of media files. Utilize the same tools to extract the hidden data from the metadata. Embed the message within the metadata of media files without visibly affecting the media content.
10. Image Color Modification Images Use stegano.py or OpenStego to modify the color channels of an image to hide data. Use the same tools to extract the hidden data from the stego image. Modify the color channels (RGB or HSV) to encode data, resulting in minor changes in the image appearance.
11. Whitespace Steganography Text Use Python scripts or tools like Snow or BPCS-Steganography to encode data in whitespaces. Use the same tools or scripts to extract the hidden data from the text. Encode binary data within whitespaces in a text document, making it appear as regular text.
12. Spread Spectrum Technique Multimedia Use Chirp Spread Spectrum modulation to spread the message across audio or image frequencies. Implement the same technique to extract the spread message from the media. Spread the message across the entire media file using frequency hopping or direct sequence spread spectrum.
13. Text Steganography in DNS Text Use DNS TXT records to hide data by encoding it in subdomains or query strings. Extract the hidden data from DNS TXT records using the same method. Hide data by encoding it within DNS TXT records, leveraging subdomains or query strings.
14. Steganography in IPv6 Network Utilize IPv6 headers' unused fields to hide data in network packets. Extract the hidden data from the IPv6 headers of network packets. Use unused fields in IPv6 headers to embed data within network packets, providing a covert communication channel.
15. Steganography in TCP/UDP Network Utilize unused TCP/UDP header fields to hide data in network packets. Extract the hidden data from the TCP/UDP headers of network packets. Use unused fields in TCP/UDP headers to embed data within network packets, creating a covert communication channel.
16. Invisible Ink Steganography Text Utilize lemon juice or other invisible inks on paper to write a hidden message. Reveal the message by heating the paper or using UV light to make the ink visible. Write the hidden message using invisible ink, which becomes visible when subjected to specific conditions.
17. Hide Data in Font Styles Text Embed data by varying font styles (size, weight, italic, etc.) or using whitespace between characters. Extract the hidden data by analyzing font variations and whitespace. Encode data by modifying font styles or using specific whitespace patterns in the text, allowing the hidden message to blend with the visible text.
18. Chaffing and Winnowing Text Split the message into packets, then intersperse real and fake packets before sending. Receive the packets, extract the real ones

, and discard the fake packets. | Intersperse real data packets with fake ones during transmission, where the receiver discards the fake packets and reassembles the original message from the real packets. | | 19. Steganography in Punctuation | Text | Encode data within punctuation marks, such as commas, periods, or exclamation marks. | Extract the hidden data by analyzing the pattern of punctuation marks. | Hide data by altering the use or frequency of punctuation marks, allowing the hidden message to be hidden in plain sight within the text. | | 20. Barcode Steganography | Images | Use barcode-generating tools to encode data in barcodes on images. | Use barcode readers or decoder tools to extract the hidden data from the image. | Encode data in the form of barcodes, which can be read by barcode readers or decoding tools. |