DESKTOP

Hide Files with Steganography (Part 3)

11/16/2012 6:27:44 PM

DeepSound

Description: DeepSound hides files you want to keep private in standard audio files
DeepSound hides files you want to keep private in standard audio files

This steganography utility is specifically designed to store hidden files within audio tracks, and it only supports WAV and FLAC files. If you don't mind these limitations, it's quite a good utility you start by browsing the disk drive and selecting the audio file, which will hold whatever you want to hide. Selecting an ordinary music track of about four minutes provided nearly 12MB of storage space. You can then browse the disk drive and select one or more files that you want to store in it. There's an option to encrypt the files using 256-bit AES, and then a copy of the audio file containing the encrypted hidden files is saved to disk.

An interesting feature of this type of encryption is that you can write the audio files to a CD. It appears to be a standard music disc that plays just like any other, but the tracks contain hidden files. It's possible to extract the encrypted files from the CD whenever you need it. To use this feature, separate CD-writing software is required and it must not alter the audio tracks in any way, such as equalizing the volume, because this would destroy the data.

Our Secret

This is a very simple utility compared to OpenPuff, and perhaps it's called Our Secret because the author doesn't actually tell you how it works! There are two sides to the software: on the left you can hide files and on the right you can unhide them. Whether you're hiding or un-hiding a file, you select a carrier, which is the file that stores whatever you're hiding. It's not clear what file types are supported, but I tried JPEGs and WAVs and they worked fine. It's possible that other types are supported, so experiment with it. After selecting the carrier file, the password is entered.

If you're hiding a file, you click Add and choose a photo, text file or whatever you want to make invisible. There's an option to display a text editor and to type in a message too, which could be useful if you want to stored passwords or other information. Clicking 'Hide' then saves a new version of the carrier file with the hidden content. If the audio files are played or the photos viewed, you wouldn't know they contained other files and messages. There is no information on whether the hidden files or messages are encrypted and if they are, what type of encryption is used. Without that knowledge, you don't know how secure it is, but even so, if someone finds digital camera photos on your PC or in an email, they probably wouldn't suspect that you're actually storing or sending secret files and messages.

Description: Our secret is very easy to use, and it is hides files or messages in photo and music
Our secret is very easy to use, and it is hides files or messages in photo and music

SteganographX Plus

Description: Load a BMP file, insert the text to be hidden and then encrypt it in SteganographX Plus
Load a BMP file, insert the text to be hidden and then encrypt it in SteganographX Plus

SteganographX Plus is a very basic utility, but it could be useful for hiding certain information. It only works with BMP files, and after loading an image into the program, there's a box at the bottom of the window to enter text. You could also copy it and paste it from another program like Word, Notepad or a web page. Clicking 'Insert Text' inserts it into the image. There's an option to encrypt the whole file, even the image itself and afterwards it looks like random pixels of color. A thief or hacker might then assume that the image was corrupt, but load the image back into the program and you can decrypt it to restore the image and extract the text. It isn't the most secure or flexible tool, but it's free, so try it.

Description: This simple utility can hide one or more files within a BMP image like a photograph
This simple utility can hide one or more files within a BMP image like a photograph

Xiao Steganography

Like Our Secret, there isn't much information about Xiao Steganography, but it appears to hide files within BMP and WAV files. When it's run, you're prompted to select the target file, which is called the carrier in other steganography tools. You can then add one or more files to this. As each one is added, the amount of space available is displayed and only so much can be stored. There are then five encryption algorithms and the usual suspects are in the line-up, such as DES, triple DES and so on. There are four hashing algorithms to choose from too. This means that whatever you hide is secure even if someone knows that the carrier file contains secret information.

Step by Step With Anti Tracks

1.    Start Anti Tracks and click the Data Concealing section on the left. Click 'Hide Files and Folders'. Either drag files from an Explorer window or click 'Browse' and select the file to hide.

2.    After adding one or more files, click 'Next' and then tick the box to encrypt them. There are several different encryption methods to choose from and then you can enter a password.

3.    On the next screen, you're prompted to select a container for the files to be hidden. Click the button and then go to the Pictures library Select a photo. The larger it is the better.

4.    The photo is saved with a new name so you still have the original. Open an Explorer window and double-click the original and the one with the hidden files. Can you tell the difference?

Other  
 
Most View
AMD And Nvidia Based Products In The New Benchmark (Part 1)
Microsoft Surface Pro - The New Windows Tablet
Origin’s EON17-S Is An Absolute Beast
Nikon 1 J3 – April 2014
SQL Server 2012 : Encryption Support (part 4) - Transparent Data Encryption - Enabling TDE, Backing Up the Certificate
Premiere Elements 11
Thunderstruck ASUS Brings Thunderbolt 2 To Your PC (Part 1)
What Is CEBP?
OS X Mountain Lion: What’s New - The System (Part 6)
Windows 7 : WORKING WITH THE FIREWALL (part 5) - Using the GPO Technique - Obtaining a List of Rules
Top 10
Windows 8 : Monitoring, optimizing, and troubleshooting system health and performance (part 5) - Monitoring system resources by using Performance Monitor
Windows 8 : Monitoring, optimizing, and troubleshooting system health and performance (part 4) - Configuring and analyzing event logs
Windows 8 : Monitoring, optimizing, and troubleshooting system health and performance (part 3) - Using Windows Action Center
Windows 8 : Monitoring, optimizing, and troubleshooting system health and performance (part 2) - App history, Startup, Services
Windows 8 : Monitoring, optimizing, and troubleshooting system health and performance (part 1) - Processes, Performance
Sharepoint 2013 : List and library essentials - Creating and deleting lists
Sharepoint 2013 : List and library essentials - Using your apps
Sharepoint 2013 : Developing Applications Using Office Services - What’s New in Access Services
Sharepoint 2013 : Developing Applications Using Office Services - The New Machine Translation Services
Sharepoint 2013 : Developing Applications Using Office Services - Word Automation Services and the New PowerPoint Automation Services