Skip to main content

How to Hide Data in Image, Audio & Video Files: Steganography

 How to Hide Data in Image, Audio & Video Files: Steganography

How to Hide Data in Images



Ever wondered to know how to hide secret messages in image, audio and video files? Well, in this post I will take you through a concept called steganography using which, it is possible to hide your secret information in image files, songs or any other file of your choice. At the end of this post, you can also download free stegnographic tools and start hiding your data.

What is Steganography?

Steganography is a means of obscuring data where secret messages are hidden inside computer files such as images, sound files, videos and even executable files so that, no one except the sender and the receiver will suspect the existence of stealth information in it. Steganography may also involve the usage of cryptography where the message is first encrypted before it is concealed in another file. Generally, the messages appear to be something else such as an image, sound or video so that the transfer of secret data remains unsuspected.
The main advantage of steganography over other methods such as cryptography is that, it will not arose suspicion even if the files fall in the hands of a third party. Unlike cryptographic messages, stegnographic messages will no way attract the attention of a third party by themselves. Thus stegnanography has an upper hand over cryptography as it involves both encryption and obscurity.

What are the Applications of Steganography?

Steganography is mainly used to obscure confidential information/data during storage or transmission. For example, one can hide a secret message in an audio file and send this to another party via email instead of sending the message in the textual format. The receiver on the other end will decrypt the hidden message using the private decryption key. In a worst case scenario, even if a third party does manage to gain access to the email, all he can find is the audio file and not the hidden data inside it. Other usage of steganography include digital watermarking of images for reasons such as copyright protection.
Even though steganography has many useful applications, some may use this technique for illegitimate purposes such as hiding a pornographic content in other large files. Rumors about terrorists using steganography for hiding and communicating their secret information and instructions are also reported. An article claiming that, al-Queda had used steganography to encode messages in images and transported them via e-mails, was reported by New York Times, in October 2001.

How do Steganography Tools Work?

Stegnography tools implement intelligent algorithms to carefully embed the encrypted text messages or data inside other larger files such as an image, audio, video or an executable file. Some tools will embed the encrypted data at the end of another file so that there will be enough room for storing larger data.
There are many steganography tools available online but only a few are able to work flawlessly. I did not find any tool that worked perfectly on both small and large data. However, I have  managed to develop my own tool that can work perfectly on all types of files and all size of data. The tool is called “Stego Magic“. You can download it from the following link.
Download Stego Magic
The zip file contains two versions of Stego Magic: One for encrypting the text messages and the other for encrypting binary files. StegoMagic_TXT can be used to hide text messages in other files such as an image or a sound file. StegoMagic_BIN can be used to hide one binary file in another such as an executable file inside an image or an image inside a video file.
With Stego Magic, there is no limitation on the size and type of the file that you are intending to hide. For example, you can hide a video of size 1 GB in an image of size 1 MB or hide an executable file inside a WORD document. The tool is pretty straightforward to use and requires no special understanding of the concept.
At the end of the encryption process, a secret decryption key will be generated and the same is required during the decryption process.

How to Use Stego Magic?

Suppose you want to hide a text message inside a JPG file:
  1. Place the JPG and the text file (.txt) in the same folder as that of StegoMagic_TXT.exe
  2. Run StegoMagic_TXT.exe and follow the screen instructions to embed the text message inside the JPG image.
  3. Note down the secret decryption key.
Now you can send this image to your friend via email. To decrypt the hidden message, your friend should load this JPG file onto the Stego Magic tool and use the secret decryption key.
I hope you enjoy this post :) . For queries and feedback, please pass your comments .

Comments

Popular posts from this blog

How To Create Your Own Operating System

                               Today in this post i am going to show you how to make Your Own OPERATING SYSTEM Online. No Coding knowledge, No Technical skills required. Nowdays we are using lots of operating systems like Windows, Mac, Linux etc Have you ever thought how this Operating systems are made  ? Ever thought to make your own operating system if yes then today you are going to learn how to make your own customized operating system. The operating system which you will be creating will be a LINUX based Operating system. There is no technical skills required for creating an own Linux Operating System online. Linux is a kernel, which can be used to create Operating System. Operating Systems created by using Linux kernel are called Linux Operating Systems.  Operating Systems like Ubuntu and SUSE are  example of Linux operating systems. To create your own Operating System you don...

How To Unlist Your Number From TrueCaller App

TrueCaller is a mobile app using which you can get details of a mobile contact number by just searching for it. TrueCaller App syncronizes the mobile contact numbers of all the mobiles on which TrueCaller App is linked on to their database and thus provide those info to their app users. So the people who only know the mobile number but dont know the name they can easily find out the contact name of that number using TrueCaller App but still this App is known for not maintaing the   privacy as some people dont want their contact info to be shared online and thus want to Unlist or remove their contact info from the TrueCaller App database. once you remove your mobile number from TrueCaller database it cannot be added after then. so today i will tell you a method to Unlist your mobile number from TrueCaller database or app. the TrueCaller company has provided a official method to remove the mobile numbers of the people who dont want to show it. follow the steps given below to...

How To Watch 18+ Adult Videos on YouTube Without Logging In

Youtube is the most popular video streaming website. YouTube has thousands of streaming videos on nearly every topic. Which are  free to watch.Certain videos that contain nudity, explicit, or violence content are put under 18+ categor y and you can’t watch these videos on YouTube unless you are logged into your YouTube / Google account .In this post I will show you a simple hack on how to see those videos The following message appears while you try to watch 18+ Video, “This content may contain material flagged by YouTube’s user community that may be inappropriate for some users.” “To view this video or group, please verify you are 18 or older by signing in or signing up. If you would instead prefer to avoid potentially inappropriate content, consider activating YouTube’s Safety Mode.” Watch 18+ Videos Without Youtube Account or Loggin in Here is a simple hack for seeing those videos, Just replace “watch” in the YouTube URL with “watch_popup” and the 18+ video ...