Table 2. Software tools for steganographic data concealment..
Table 2. Software tools for steganographic data concealment
Name | Features | Operating principle | Advantages | Disadvantages | Operating system |
OutGuess | Hiding data in JPEG images | Hiding data in the least significant non-zero bits of quantized image block coefficients | Ability to control the introduced “statistical distortions”, greater resistance to attacks | Written for UNIX-like operating systems | |
JSTEG | Vulnerable to attacks by passive opponents, the ability to automatically detect the presence of a hidden message | Oriented to the MS-DOS operating system | |||
JPHS | |||||
Gifshuffle | Hiding data in GIF graphic files | Hiding information by changing the order of colors in the palette | Possibility of preliminary compression or encryption of the hidden message | Small size of the hidden message, independent of the container size | Written for work in UNIX-like operating systems. |
Hide-and-Seek | Hiding information by replacing the least significant bits of the color indices of image pixels | Uses the “Blowfish” encryption algorithm, randomly selects storage points | Oriented to the MS-DOS operating system. | ||
Steganos | Hiding in graphic files BMP, DIB, VOC, WAV, ASCII | Hiding information by replacing the least significant bits of image elements | Filling unused container space with a noise-like signal | Using obsolete container formats | Oriented to the MS-DOS and Windows operating systems |
Steghide | Hiding data in graphic BMP and audio WAV and AU files | Hiding information by replacing the least significant bits of container elements | Possibility of preliminary encryption of the hidden message | Oriented to the MS-DOS operating system | |
DC-Stegano | Hiding data in graphic files in PCX format | Hiding by replacing the least significant bits of the color indices of image pixels | No stego key, strictly specified size of the container image | ||
Invisible Secrets 2002 | Embedding data into audio data in PCM, WAV, BMP, DIB, VOC, HTML, ASCII formats | Hiding information by replacing the least significant bits of container elements, as well as by adding spaces at the end of the line for ASCII format | No distribution of hidden information across the container, no preliminary analysis of the container for suitability | Targeted for the Microsoft Windows operating system | |
Steganos for Windows | Filling unused container space with a noise-like signal | Using legacy container formats | |||
Hide4PGP | Distributing hidden information across the container | No preliminary analysis of the container for suitability | |||
StegoWav | Embedding data into PCM (WAV) audio data | Hiding information by replacing the least significant bits of container elements | Encryption of a hidden message, distribution of hidden information across a container | A product that is not being developed, uses outdated container formats | Microsoft Windows-oriented operating system |
Steaghan | Hiding data in BMP graphic and WAV audio files | Written to work in UNIX-like operating systems | |||
S-Tools | Embedding data into PCM (WAV) audio data | Using legacy container formats | Microsoft Windows-oriented operating system | ||
MP3Stego | Embedding data into MP3 audio data | Concealment of information based on parity change during quantization of frequency coefficients at the stage of audio stream compression | Compression and encryption of the hidden message, noise filling of unused container space | Vulnerability to attacks of an active adversary (to destruction of hidden data) | Oriented to Microsoft Windows and UNIX operating systems |
UnderMP3 Cover | Hiding information by embedding incorrect MP3 frames into a container | Low resistance to passive steganalysis | Written to run on UNIX-like operating systems | ||
WNS (White Noise Storm) | Universal steganography program | The file to be hidden is encrypted with the PGP algorithm and then hidden in the container | Good quality of accompanying documentation | Increased container size requirements due to the selected encryption method | OC DOS |
Covert_TCP | The program manages the TCP_IP header and transmits one hidden byte with each file | Transmission of hidden data is carried out both with data packets and with service packets | Great opportunities for transmitting hidden data. The program can work as a station and as a user | Linux OS | |
SecurEngine | Embedding data into text files, graphic files (BMP, JPG) and audio files (WAV) | Compression and encryption of the hidden message | Oriented to the Microsoft Windows operating system |