Table 2. Software tools for steganographic data concealment.

logo11d 4 1

Table 2. Software tools for steganographic data concealment..

Table 2. Software tools for steganographic data concealment.

Table 2. Software tools for steganographic data concealment

Name Features Operating principle Advantages Disadvantages Operating system
OutGuess Hiding data in JPEG images Hiding data in the least significant non-zero bits of quantized image block coefficients Ability to control the introduced “statistical distortions”, greater resistance to attacks   Written for UNIX-like operating systems
JSTEG   Vulnerable to attacks by passive opponents, the ability to automatically detect the presence of a hidden message Oriented to the MS-DOS operating system
JPHS
Gifshuffle Hiding data in GIF graphic files Hiding information by changing the order of colors in the palette Possibility of preliminary compression or encryption of the hidden message Small size of the hidden message, independent of the container size Written for work in UNIX-like operating systems.
Hide-and-Seek Hiding information by replacing the least significant bits of the color indices of image pixels Uses the “Blowfish” encryption algorithm, randomly selects storage points   Oriented to the MS-DOS operating system.
Steganos Hiding in graphic files BMP, DIB, VOC, WAV, ASCII Hiding information by replacing the least significant bits of image elements Filling unused container space with a noise-like signal Using obsolete container formats Oriented to the MS-DOS and Windows operating systems
Steghide Hiding data in graphic BMP and audio WAV and AU files Hiding information by replacing the least significant bits of container elements Possibility of preliminary encryption of the hidden message Oriented to the MS-DOS operating system
DC-Stegano Hiding data in graphic files in PCX format Hiding by replacing the least significant bits of the color indices of image pixels   No stego key, strictly specified size of the container image
Invisible Secrets 2002 Embedding data into audio data in PCM, WAV, BMP, DIB, VOC, HTML, ASCII formats Hiding information by replacing the least significant bits of container elements, as well as by adding spaces at the end of the line for ASCII format   No distribution of hidden information across the container, no preliminary analysis of the container for suitability Targeted for the Microsoft Windows operating system
Steganos for Windows Filling unused container space with a noise-like signal Using legacy container formats
Hide4PGP Distributing hidden information across the container No preliminary analysis of the container for suitability
StegoWav Embedding data into PCM (WAV) audio data Hiding information by replacing the least significant bits of container elements Encryption of a hidden message, distribution of hidden information across a container A product that is not being developed, uses outdated container formats Microsoft Windows-oriented operating system
Steaghan Hiding data in BMP graphic and WAV audio files Written to work in UNIX-like operating systems
S-Tools Embedding data into PCM (WAV) audio data Using legacy container formats Microsoft Windows-oriented operating system
MP3Stego Embedding data into MP3 audio data Concealment of information based on parity change during quantization of frequency coefficients at the stage of audio stream compression Compression and encryption of the hidden message, noise filling of unused container space Vulnerability to attacks of an active adversary (to destruction of hidden data) Oriented to Microsoft Windows and UNIX operating systems
UnderMP3 Cover Hiding information by embedding incorrect MP3 frames into a container   Low resistance to passive steganalysis Written to run on UNIX-like operating systems
WNS (White Noise Storm) Universal steganography program The file to be hidden is encrypted with the PGP algorithm and then hidden in the container Good quality of accompanying documentation Increased container size requirements due to the selected encryption method OC DOS
Covert_TCP The program manages the TCP_IP header and transmits one hidden byte with each file Transmission of hidden data is carried out both with data packets and with service packets Great opportunities for transmitting hidden data. The program can work as a station and as a user   Linux OS
SecurEngine Embedding data into text files, graphic files (BMP, JPG) and audio files (WAV)   Compression and encryption of the hidden message   Oriented to the Microsoft Windows operating system

Добавить комментарий

Ваш адрес email не будет опубликован. Обязательные поля помечены *

одиннадцать − один =

Мы используем cookie-файлы для наилучшего представления нашего сайта. Продолжая использовать этот сайт, вы соглашаетесь с использованием cookie-файлов.
Принять