3.2 Evaluation Method
Various steganographic software packages were explored. The evaluation process was to determine limitations and flexibility of the software readily available to the public.
Message and container files were selected before testing. This proved to be a problem with some packages due to limitations of the software. The images selected had to be altered to fit into the constraints of the software and other containers were used. In all, a total of 25 files were used as containers (much more than I have room to discuss).
The files used for evaluation included two "message" files and two "container" files. The "message" files are those to be hidden in the innocent looking "container" files.