Name Last Update
..
crypt Loading commit data...
image Loading commit data...
james Loading commit data...
java Loading commit data...
ortega Loading commit data...
sun Loading commit data...
Embed.class Loading commit data...
Embed.java Loading commit data...
Extract.class Loading commit data...
Extract.java Loading commit data...
Makefile Loading commit data...
bin.noise Loading commit data...
d Loading commit data...
d.bat Loading commit data...
e Loading commit data...
e.bat Loading commit data...
gpl.txt Loading commit data...
license.txt Loading commit data...
lopez.bmp Loading commit data...
lopez.jpg Loading commit data...
ms_d.bat Loading commit data...
ms_e.bat Loading commit data...
output.txt Loading commit data...
readme.txt Loading commit data...

readme.txt

Steganography Software F5

This package is meant to demonstrate a new steganographic algorithm. It
is a very preliminary version to embed files into true colour BMP, GIF,
or JPEG images. To have secure steganography choose a good passphrase.
It is also recommended to scan a new carrier image in true colour BMP format
for every new steganographic message. Delete the carrier BMP after you
created the lossy compressed steganogram.

The attacks presented on the third Workshop on Information Hiding are not
successful with F5.
http://wwwrn.inf.tu-dresden.de/~westfeld/attacks.html

To run this software you need a Java runtime environment. There are two
shell scripts to demonstrate what you can do with this software:

e (stands for encrypt)
This is the embedding script merging the two files bandits.bmp and
bin.noise to one single file bandits.jpg. This JPEG image is the data
to delivered. The receiver of this file can extract the hidden message
using the second script

d (stands for decrypt)
which extracts a file output.txt from bandits.jpg. Output.txt and
bin.noise are equal.

To run this software from a DOS prompt you have e.bat and d.bat. To run
it with Microsoft's c:\windows\jview.exe you have ms_e.bat and ms_d.bat.

I make no warranty about the usability of this code. It is for
educational purposes and should be regarded as such.

Best regards,

Andreas Westfeld
westfeld@inf.tu-dresden.de
http://www.inf.tu-dresden.de/~aw4