Appendix A. Software

Many programs can also be found in numerous archives. Some of the better ones include:

A.1. Commercial Packages

A.2. Open Packages

These packages are either open source, freeware or shareware:

  • http://www.wbailer.com/wbstego wbStego is a tool written by Werner Bailer for inserting information into the least significant bits of BMP files which also includes options for embedding information in the PDF, HTML and ASCII files. The core tools include a variety of different encryption algorithms as well as the ability to spread out the hidden information to different locations inside the file.
  • http://skyjuicesoftware.com Data Stash from Lim Chooi Guan of SkyJuice Software will hide data in a wide variety of files.
  • http://www.pariahware.com Pict Encrypt from Pariahware is a basic tool for embedding some encrypted text in an image. It runs on the Macintosh and does not include much documentation about the algorithm.
  • The F5 package encodes information in JPEG images using a technique to thwart visual and statistical attacks. [Wes01]
  • http://diit.sourceforge.net/ The Digital Invisible Ink Toolkit written by Kathryn Hempstalk includes several algorithms for encoding information and several algorithms for analyzing the results to look for steganography. The hiding algorithms all work on the least significant bits. The more sophisticated algorithms use Sobel filters or Laplace filters to flag the best pixels for hiding information. These tend to flag the edges between objects where the intensity of the image changes quickly.
  • http://web.clicknet.ro/xidie/stegano.html The Xidie Security Suite by Laic Aurelian compresses, encrypts and embeds information in a wide variety of files including most image and sound formats. It is free for non-commercial use and a commerical license is available.
  • http://www.hermetic.ch/hst/hst.htm Hermetic Stego will hide information in BMP files. For Windows.
  • http://www.heinz-repp.onlinehome.de/Hide4PGP.htm Hide4PGP by Heinz Repp will hide information in the least significant bits of BMP and WAV files. The source and versions for Windows and Linux are available.
  • http://www.fourmilab.ch/stego Steganosaurus, from John Walker, is a C-based program that uses a dictionary to turn bits into gibberish. [Wal94]
  • ftp://ftp.hacktic.nl/pub/crypto/macintosh/ Paranoid, by Nathan Mariels, will encrypt information and hide it in sound files.
  • http://cypherspace.org/adam/stealth/ PGP Stealth, from Adam Back, will strip off all of the headers from PGP files, producing something that should be random.
  • http://www.nic.funet.fi/pub/crypt/steganography/ Texto, by Kevin Maher, is an text steganography program that uses some basic grammars. [Mah95]
  • http://www.stego.com/ Romana Machado distributed the Java version of her Stego and EzStego software from here. This cross-platform tool hides information in the least significant bit of an image after the colors in the image are sorted. This usually works quite well, but there can be some inconsistencies. The software was distributed with the GNU Public License.
  • The F5 software used for hiding information in JPEG images includes a number of enhancements designed to avoid steganalytic techniques discovered by the creator, Andreas Westfeld. [Wes01, WP99]
  • http://www.mcdonald.org.uk/StegFS/ This is the source for the Ste-ganographic File System described in Section 4.5. This software works well with Linux file systems and can probably be ex-tended to any other file systems with some work. It is released under the GNU GPL.
  • http://www.smalleranimals.com/stash.htm The StashIt software hides data in the least significant bits of images with five different techniques. There is no charge for it.
  • http://www.darkside.com.au/snow/ The Snow software, developed by Matthew Kwan, will insert extra spaces at the end of each line. Three bits are encoded in each line by adding between 0 and 7 spaces that are ignored by most display programs, including web browsers.
  • The Mandel-Steg software hides information in the least significant bit of an image of the Mandelbrot set. The set can be synthesized for any set of coordinates in the plane with seven bits of accuracy. The last bit is the message.
  • http://www.stella-steganography.de/ The Stella (Steganography Exploration Lab) software is both a tool for hiding information in bitmaps and a lab for exploring how hidden the information may be. The software includes a number of different tools for taking apart the images to see the effects.
  • http://www.darkside.com.au/gifshuffle/ The Gifshuffle program written by Matthew Kwan hides information in the ordering of the palette of an image. If there are n! different ways to arrange n objects, then log2(n!) bits can be hidden in the choice of which sorting to choose. GifShuffle hides 209 bytes in the way that it selects 256 colors.
  • http://glu.freeservers.com/sgpo.htm David Glaude and Didier Barzin created this program (SteganoGifPaletteOrder) that hides information in the permutation of the colors in the GIF palette in the same manner as GifShuffle.
  • http://www.spammimic.com David McKellar created one grammar that encodes message in spam-like phrases removed from his collection of spam messages. It is based on the algorithms described in Chapter 7.
  • http://www.steganos.com/ Steganos sells a suite of security products that includes The Safe, a “hard drive that disappears at the click of a button.”
  • http://www.tiac.net/users/korejwa/jsteg.htm This is the JSteg software enhanced with a Windows shell.
  • http://linux01.gwdg.de/atilde/stego.html The JPHide and JPSeek programs, written by Allan Latham, hide information in the JPEG coefficients using classical algorithms. The software keeps track of the change in the statistical profile of the coefficients to help you avoid steganalysis. (See Chapter 17.)
  • http://www.compris.com/subitext/ Compris sells TextHide and Text-Sign, a software programs that hide information by changing the structure of sentences. The text should, in theory, say the same thing after the extra information is inserted.
  • http://www.ctgi.net/nicetext/ Mark Chapman created NiceText as his master's thesis project during his time at the University of Wisconsin studying with George Davida. The software assembles a dictionary and classifies words to make it possible to approximate styles while also hiding information in text. [CD97] See also http://www.nicetext.com.
  • http://www.datamark-tech.com/ DataMark Technologies sells four programs using steganography. One offers watermarking, one embeds raw information, one adds a digital signature to an image, and one builds a “safe”.
  • http://www.stealthencrypt.com/ Stealth Encrypt bundles a steganography wizard with its security suite.
  • http://www.heinz-repp.onlinehome.de/Hide4PGP.htm Hide4PGP stores data in the least significant bit of either BMP or WAV files. It's a small, free program.
  • http://www.blindside.co.uk/ BlindSide hides information in bitmapped images after using a proprietary encryption algorithm for extra protection.
  • http://steghide.sourceforge.net/ The Steghide software is a GPL-protected package started by Stefan Hetzl for hiding information in the least significant bits of images (BMPs) or sound files (WAV or AU).
  • http://www.brasil.terravista.pt/Jenipabu/2571/e_hip.htm Hide In Picture stores information in the least significant bits of image files.
  • http://www.intar.com/ITP/itpinfo.htm In The Picture hides information in 4-bit, 8-bit and 24-bit images. The software can also store multiple files protected with different passwords.
  • http://sourceforge.net/projects/mixmaster/ MixMaster is an excellent set of tools for running and using anonymous remailers.
  • http://members.nbci.com/fredc/encryptpic.html EncryptPic hides information in 24-bit BMP images after scrambling them with the Cast algorithm.
  • ftp://idea.sec.dsi.unimi.it/pub/security/crypt/code/s-tools4.zip Andrew Brown wrote S-Tools, one of the first programs for hiding information in image and sound files.
  • http://www.neobytesolutions.com/invsecr/index.htm Invisible Secrets is a shareware program for storing information in the usual places. It is a well-designed and highly polished program. A version supported by banner ads is also available.
  • http://www.neobytesolutions.com/invsecr/index.htm S-Mail hides information in x86 executable files (.exe or .dll) The programs still work after the information is inserted.
  • http://www.camouflagesoftware.co.uk/ Camouflage is a basic tool for compressing, encrypting and then appending the information to the end of a file. The information isn't inserted stegano-graphically into the actual data, it's just stuck at the end. This is often good enough an is guaranteed not to leave any distortion to the cover file.
  • http://wbstego.wbailer.com/ wbStego is a polished, professional tool for hiding information in sound, image and text formats. The latest version can also store them in Adobe PDF files in order to help establish ownership.
  • http://www.scramdisk.clara.net/ If you want to hide information in a scrambled directory on your hard drive, Scramdisk provides the mechanism.
  • http://www.petitcolas.net/fabien/steganography/mp3stego/index.html Fabien A. P. Petitcolas created MP3Stego for hiding information in the very popular MP3 files. The mechanism tweaks the parity of some of the quantized coefficients chosen using a random number generator. [AP98]
  • http://www.outguess.org/ Niels Provos built the Outguess system to hide information in JPEG files without distorting the statistical profile. He also distributes the StegDetect program, which will detect distortions in other steganographic systems.
  • http://www.psionic.com/papers/covert/ Psionic Software created this package for hiding information in the redundant or optional bits of the TCP/IP headers. (The IP packet identification field, the TCP initial sequence number field and the TCP acknowledged sequence number field.)
  • http://sandmark.cs.arizona.edu/ The SandMark tool, by Christian Collberg, will embed information while obfuscating Java byte code.
  • ftp://ftp.funet.fi/pub/crypt/steganography/PGM.stealth.c.gz PGM-Stealth hides data in the least significant bits of PGM files on UNIX boxes.
  • ftp://ftp.funet.fi/pub/crypt/steganography/piilo061195.tar.gz Piilo hides data in the least significant bits of PGM files on UNIX boxes.
  • The Stir-Mark software helps test watermarking or image steganographic methods by scrambling the images in subtle ways. The software treats the image like a rubber sheet by stretching some parts, blurring other parts, destroying some parts, and even duplicating small parts. The meddling is controlled with parameters so watermark creators can make claims like, “This software resists StirMark at settings up to 1.5.”

A.3. Steganalysis Software

  • http://www.spy-hunter.com/stegspydownload.htm StegSpy, by Bill Englehardt, identifies some of the more common signatures used in steganography programs.
  • http://www.outguess.org/ Niels Provos built the StegDetect system to detect statistical differences in files with embedded messages. He also distributes the OutGuess program, which hides information in JPEG files.
  • http://www.sarc-wv.com/ The Steganography Analysis and Research Center (SARC), a division of BackBone Security, builds the Steganography Analyzer Signature Scanner (StegAlyzerSS) and the Steganography Analyzer Artifact Scanner (StegAlyzerAS), two tools that detect unique statistical signatures or artifacts added by some common steganography programs.
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
13.58.201.235