http://www.bluespike.com/ This company led by Scott Moskowitz holds a number of significant patents for watermarking and embedding information in files
The Giovanni watermarking system offers point-and-click watermarking.
http://www.mediasec.com Mediasec offers MediaSign and Media-Trust tools for embedding digital signatures in files.
http://web.clicknet.ro/xidie/stegano.html The Xidie Security Suite, by Laic Aurelian, compresses, encrypts, and embeds information in a wide variety of files, including
most image and sound formats. It is free for noncommercial use and a commerical license is available.
A.2. Open Packages
These packages are either open source, freeware or shareware:
http://www.wbailer.com/wbstego wbStego is a tool written by Werner Bailer for inserting information into the least significant bits of BMP files which also
includes options for embedding information in the PDF, HTML and ASCII files. The core tools include a variety of different
encryption algorithms as well as the ability to spread out the hidden information to different locations inside the file.
http://skyjuicesoftware.com Data Stash from Lim Chooi Guan of SkyJuice Software will hide data in a wide variety of files.
http://www.pariahware.com Pict Encrypt from Pariahware is a basic tool for embedding some encrypted text in an image. It runs on the Macintosh and
does not include much documentation about the algorithm.
The F5 package encodes information in JPEG images using a technique to thwart visual and statistical attacks. [Wes01]
http://diit.sourceforge.net/ The Digital Invisible Ink Toolkit written by Kathryn Hempstalk includes several algorithms for encoding information and several
algorithms for analyzing the results to look for steganography. The hiding algorithms all work on the least significant bits.
The more sophisticated algorithms use Sobel filters or Laplace filters to flag the best pixels for hiding information. These
tend to flag the edges between objects where the intensity of the image changes quickly.
http://web.clicknet.ro/xidie/stegano.html The Xidie Security Suite by Laic Aurelian compresses, encrypts and embeds information in a wide variety of files including
most image and sound formats. It is free for non-commercial use and a commerical license is available.
http://www.heinz-repp.onlinehome.de/Hide4PGP.htm Hide4PGP by Heinz Repp will hide information in the least significant bits of BMP and WAV files. The source and versions
for Windows and Linux are available.
http://www.fourmilab.ch/stego Steganosaurus, from John Walker, is a C-based program that uses a dictionary to turn bits into gibberish. [Wal94]
http://cypherspace.org/adam/stealth/ PGP Stealth, from Adam Back, will strip off all of the headers from PGP files, producing something that should be random.
http://www.stego.com/ Romana Machado distributed the Java version of her Stego and EzStego software from here. This cross-platform tool hides information
in the least significant bit of an image after the colors in the image are sorted. This usually works quite well, but there can be some inconsistencies. The software was
distributed with the GNU Public License.
The F5 software used for hiding information in JPEG images includes a number of enhancements designed to avoid steganalytic techniques discovered by the creator, Andreas Westfeld. [Wes01, WP99]
http://www.mcdonald.org.uk/StegFS/ This is the source for the Ste-ganographic File System described in Section 4.5. This software works well with Linux file systems and can probably be ex-tended to any other file systems with some work.
It is released under the GNU GPL.
http://www.smalleranimals.com/stash.htm The StashIt software hides data in the least significant bits of images with five different techniques. There is no charge
for it.
http://www.darkside.com.au/snow/ The Snow software, developed by Matthew Kwan, will insert extra spaces at the end of each line. Three bits are encoded in
each line by adding between 0 and 7 spaces that are ignored by most display programs, including web browsers.
The Mandel-Steg software hides information in the least significant bit of an image of the Mandelbrot set. The set can be
synthesized for any set of coordinates in the plane with seven bits of accuracy. The last bit is the message.
http://www.stella-steganography.de/ The Stella (Steganography Exploration Lab) software is both a tool for hiding information in bitmaps and a lab for exploring
how hidden the information may be. The software includes a number of different tools for taking apart the images to see the
effects.
http://www.darkside.com.au/gifshuffle/ The Gifshuffle program written by Matthew Kwan hides information in the ordering of the palette of an image. If there are
n! different ways to arrange n objects, then log2(n!) bits can be hidden in the choice of which sorting to choose. GifShuffle hides 209 bytes in the way that it selects 256
colors.
http://glu.freeservers.com/sgpo.htm David Glaude and Didier Barzin created this program (SteganoGifPaletteOrder) that hides information in the permutation of
the colors in the GIF palette in the same manner as GifShuffle.
http://www.spammimic.com David McKellar created one grammar that encodes message in spam-like phrases removed from his collection of spam messages.
It is based on the algorithms described in Chapter 7.
http://www.steganos.com/ Steganos sells a suite of security products that includes The Safe, a “hard drive that disappears at the click of a button.”
http://linux01.gwdg.de/atilde/stego.html The JPHide and JPSeek programs, written by Allan Latham, hide information in the JPEG coefficients using classical algorithms.
The software keeps track of the change in the statistical profile of the coefficients to help you avoid steganalysis. (See
Chapter 17.)
http://www.compris.com/subitext/ Compris sells TextHide and Text-Sign, a software programs that hide information by changing the structure of sentences. The
text should, in theory, say the same thing after the extra information is inserted.
http://www.ctgi.net/nicetext/ Mark Chapman created NiceText as his master's thesis project during his time at the University of Wisconsin studying with
George Davida. The software assembles a dictionary and classifies words to make it possible to approximate styles while also
hiding information in text. [CD97] See also http://www.nicetext.com.
http://www.datamark-tech.com/ DataMark Technologies sells four programs using steganography. One offers watermarking, one embeds raw information, one adds
a digital signature to an image, and one builds a “safe”.
http://www.blindside.co.uk/ BlindSide hides information in bitmapped images after using a proprietary encryption algorithm for extra protection.
http://steghide.sourceforge.net/ The Steghide software is a GPL-protected package started by Stefan Hetzl for hiding information in the least significant
bits of images (BMPs) or sound files (WAV or AU).
http://www.intar.com/ITP/itpinfo.htm In The Picture hides information in 4-bit, 8-bit and 24-bit images. The software can also store multiple files protected
with different passwords.
http://www.neobytesolutions.com/invsecr/index.htm Invisible Secrets is a shareware program for storing information in the usual places. It is a well-designed and highly polished
program. A version supported by banner ads is also available.
http://www.camouflagesoftware.co.uk/ Camouflage is a basic tool for compressing, encrypting and then appending the information to the end of a file. The information
isn't inserted stegano-graphically into the actual data, it's just stuck at the end. This is often good enough an is guaranteed
not to leave any distortion to the cover file.
http://wbstego.wbailer.com/ wbStego is a polished, professional tool for hiding information in sound, image and text formats. The latest version can
also store them in Adobe PDF files in order to help establish ownership.
http://www.scramdisk.clara.net/ If you want to hide information in a scrambled directory on your hard drive, Scramdisk provides the mechanism.
http://www.petitcolas.net/fabien/steganography/mp3stego/index.html Fabien A. P. Petitcolas created MP3Stego for hiding information in the very popular MP3 files. The mechanism tweaks the parity of some of the quantized coefficients chosen using a random
number generator. [AP98]
http://www.outguess.org/ Niels Provos built the Outguess system to hide information in JPEG files without distorting the statistical profile. He also
distributes the StegDetect program, which will detect distortions in other steganographic systems.
http://www.psionic.com/papers/covert/ Psionic Software created this package for hiding information in the redundant or optional bits of the TCP/IP headers. (The
IP packet identification field, the TCP initial sequence number field and the TCP acknowledged sequence number field.)
http://sandmark.cs.arizona.edu/ The SandMark tool, by Christian Collberg, will embed information while obfuscating Java byte code.
The Stir-Mark software helps test watermarking or image steganographic methods by scrambling the images in subtle ways. The
software treats the image like a rubber sheet by stretching some parts, blurring other parts, destroying some parts, and even
duplicating small parts. The meddling is controlled with parameters so watermark creators can make claims like, “This software
resists StirMark at settings up to 1.5.”
http://www.outguess.org/ Niels Provos built the StegDetect system to detect statistical differences in files with embedded messages. He also distributes
the OutGuess program, which hides information in JPEG files.
http://www.sarc-wv.com/ The Steganography Analysis and Research Center (SARC), a division of BackBone Security, builds the Steganography Analyzer
Signature Scanner (StegAlyzerSS) and the Steganography Analyzer Artifact Scanner (StegAlyzerAS), two tools that detect unique
statistical signatures or artifacts added by some common steganography programs.