Steganograpy Software

3.2 Evaluation Method

Various steganographic software packages were explored. The evaluation process was to determine limitations and flexibility of the software readily available to the public.

Message and container files were selected before testing. This proved to be a problem with some packages due to limitations of the software. The images selected had to be altered to fit into the constraints of the software and other containers were used. In all, a total of 25 files were used as containers (much more than I have room to discuss).

 


Evaluation Method

The files used for evaluation included two "message" files and two "container" files. The "message" files are those to be hidden in the innocent looking "container" files.

 


Next Section: 3.3 Software Evaluation



 [Figure 2: Renoir Palette, Figure 3: Nebula Palette (18k)]
[Neil's Homepage] [Security and Privacy] [Steganography]

Copyright, ©1995-2000 Neil F. Johnson. All Rights Reserved.
Send comments or questions to nfj(at)jjtc(dot)com.

Internet Developers Association
Member
The author is a member of
The HTML Writers Guild

Get Microsoft Internet Explorer

  ActiveX

This document uses tables, cascading style sheets, ActiveX controls and VBScript so it is best experienced with Microsoft Internet Explorer.