Wednesday, June 17, 2015

List Of Steganography Tools

 
 
Image Steganography:
  • F5 is a steganography algo for hiding information in JPEG images. Westfeld A. F5ea steganographic algorithm (high capacity despite better steganalysis). In: Moskowitz I, editor. Information hiding. vol. 2137 of lecture notes in Computer Science. Berlin/Heidelberg: Springer; 2001. p. 289e302. 
  • JPHIDE and JPSEEK are programs which allow you to hide a file in a jpeg visual image. 
  • Jsteg is an open steganography software on Internet. It uses the LSB of DCT coefficients to hide secret information. 
  • Mr Hide is a steganography tool for hiding information inside images. 
  • OpenPuff is a professional steganography tool, with unique features you won't find among any other free or commercial software. OpenPuff is 100% free and suitable for highly sensitive data covert transmission. 
  • OpenStego is an open-source software distributed under the terms of the GNU General Public License v2.0. 
  • Perturbed Quantization: the sender hides data while processing the cover object with an information-reducing operation that involves quantization, such as lossy compression, downsampling, or A/D conversion. 
  • Steghide is a steganography program that is able to hide data in various kinds of image- and audio-files. The color-respectively sample-frequencies are not changed thus making the embedding resistant against first-order statistical tests. 
  • Steghide Online: Web page for Steganography using Steghide.
  • StegoBlue: LSB Steganography on Bitmaps in Python.
Audio Steganography:
  • MP3Stego will hide information in MP3 files during the compression process. The data is first compressed, encrypted and then hidden in the MP3 bit stream. 

Network Steganography:
  • SteganRTP is a steganography tool which establishes a full-duplex steganographic data transfer protocol utilizing Real-time Transfer Protocol (RTP) packet payloads as the cover medium. The tool provides interactive chat, file transfer, and remote shell access. 
  • HCovert is a steganographic communications tool used to create a covert channel using a HTTP GET request to convey it's message to a webserver and webserver log parsing to retrievethe message. This tool will both send as well as recieve messages.
  • Netcross is a tunneling software particularly useful in restricted (read firewalled) network environments, which is able to establish IP tunnels exploiting Domain Name Resolution requests/responses. 
  • Cctt, "Covert Channel Tunneling Tool" - is a tool presenting several exploitation techniques allowing the creation of arbitrary data transfer channels in the data streams authorized by a network access control system.
  • Cooking channels - is a set of two python scripts (CGI and client) allowing to build a communication channel over HTTP cookies.

Image Steganalysis - Feature Extractors*:
  • Merged Features - T. Pevny and J. Fridrich, Merging Markov and DCT features for multi-class JPEG steganalysis. In E.J. Delp and P.W. Wong, editors, Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents IX, volume 6505, pages 3 1 - 3 14, San Jose, CA, January 29 / February 1, 2007. 
  • PPD - Daniel Lerch-Hostalot, David Megías. LSB matching steganalysis based on patterns of pixel differences and random embedding Computers & Security, Volume 32, February 2013, Pages 192-206. 
  • Rich Models - J. Fridrich and J. Kodovsky, Rich models for steganalysis of digital images, IEEE Transactions on Information Forensics and Security. 
  • SPAM - T. Pevny and P. Bas and J. Fridrich Steganalysis by subtractive pixel adjacency matrix. Steganalysis by subtractive pixel adjacency matrix, Princeton, NJ, September 7-8, 2009. 
A lot of feature extractors implemented in Matlab can be found here.
Network Steganalysis
  • Cctde is a first implementation of the Gray-World.net Covert Channel and Tunneling over the HTTP protocol Detection : GW implementation theoretical design paper.
Steganalysis - Classifiers:
  • Ensemble Classifiers - J. Kodovský, J. Fridrich, and V. Holub, Ensemble Classifiers for Steganalysis of Digital Media. IEEE Transactions on Information Forensics and Security, Vol. 7, No. 2, pp. 432-444, April 2012.
  • LibSVM - Chang, Chih-Chung and Lin, Chih-Jen. A library for support vector machines. ACM Transactions on Intelligent Systems and Technology. 2:27:1--27:27, 2011.
Article Taken from here : http://steganography.daniellerch.me/p/software.html

0 comments :

Post a Comment

Follow Me!

Blog Archive

Followers

Visitor Map