By stegAdmin, 6 May, 2012
Steg comments page preamble
Please take in account that your comments need to be approved before they are published. I'll be notified for each new comment with an automatic email. As you can see yourself reading the comments below , I'll not apply any kind of censure on criticism messages. I reject only spam and other kind of junk that sometimes get submitted, despite the chapta. So please, be patient and in few time you'll see your comments published and probably also with an answer. ;-) Thank you in advance.

Plain text

  • No HTML tags allowed.
  • Web page addresses and email addresses turn into links automatically.
  • Lines and paragraphs break automatically.
CAPTCHA
2 + 11 =
Solve this simple math problem and enter the result. E.g. for 1+3, enter 4.
This question is for testing whether or not you are a human visitor and to prevent automated spam submissions.

sere (not verified)

12 years 5 months ago

Bello!

Pavel (not verified)

12 years 4 months ago

Hello
how to concat with you?
your email is:
Delivery to the following recipient failed permanently:

****.contcat@*****.com

Technical details of permanent failure:
The email account that you tried to reach does not exist. Please try double-checking the recipient's email address for typos or unnecessary spaces. Learn more at http://support.google.com/mail/bin/answer.py?answer=6596

stegAdmin

12 years 3 months ago

In reply to by Pavel (not verified)

Hello!
The email address you are using is wrong (at least the one you cited in your comment).
The correct one is ".contact" and not ".contcat".
Please, do not write it in plain text (the way you have done with the wrong address):
I published my email address painted on a picture to avoid spammers. ;-)
Thank you, Fabio.

Pavel (not verified)

12 years 4 months ago

Hello

I really liked your application.
but I need to run It from the command line and the GUI does not fit.
Can You make new version - which will be work from command line?
or give me source code and I'll try to do it myself

can your send me replay to my email: ********

stegAdmin

12 years 3 months ago

In reply to by Pavel (not verified)

Thank you for the good feedback!
The feature you requested is one of the most intelligent and useful.
This would make Steg suitable for use in shell scripts and to be called from another process...
I've already considered this future development. Anyway is not exactly immediate to be done, and to be done well.
In this period, for other personal priorities, I'm not exactly in the mood of dedicate time to this hobby.
From another point of view, more technical, a new major release of the Qt Framework was released and I prefer to wait for a more stable release with a more mature SDK to do the porting of the Steg's source code prior to add other features.
When I will put hands on the Steg code, I will remember your request.
If one day I'll decide to publish the source code you will be informed.
Best regards. Fabio.

I'm still waiting to have the time to develop and release a new version!
However there is a little drawback to your request: if implemented, it would permit to use Steg functionalities from another process bypassing any reference to Steg. This is not exactly on top of my wish list. :-D
Bye, Fabio.

Jörg (not verified)

11 years 10 months ago

Well, feeling ashamed for your coding style is definitly not a resonable reason for not giving out the source. How can i know that there isn't a backdoor which makes decrypting easy for others (You)? For me a closed source encryption tool seems totally worthless.

Hello Jörg,
maybe you have not sensed the irony in the FAQ page...

Anyway, Steg is not (only) a cryptographic tool, but is, in the first place, a steganography tool.
It strives to conceal data, not only to make data indecipherable.

There are some advantages if you avoid to explicitly explain where you hide something if you want that it will not be discovered.

In any case, the decision to publish or not publish the source code is all upon me and I have no obligation to justify myself with any "reasonable reason".

Said this, I can understand your concerns. There are no backdoors in Steg, but you are free not to use it, and you can write yourself a software for steganography.

Thank you for your visit.

Ciao, Fabio.

Yes, you're right, Jörg.
Any software about cryptography / steganography without source code is "Security by obscurity".
Worthless.

Software for kids :)

I'm sorry for your frustration, but if you'll leave your kids to play with Steg I will be glad: at least it will be not so "worthless" as you stated. :-D

Oleg (not verified)

10 years 10 months ago

Hello
I can't find in manual what algorithm do You use to crypt a message. Tell, please.
Thank You

smaragdus (not verified)

10 years 9 months ago

The welcome screen and the confirmation on exit are very annoying. I would suggest an option to run Steg as a portable program- Steg writing all its settings and data in its own folder, not in AppData.

Regards

alain brunetot (not verified)

10 years 7 months ago

Hi Fabio,

Thanks a lot for your excellent STEG.

If it is possible, could you improve sync betwween two pictures when you zoom or move.

stegAdmin

10 years 7 months ago

In reply to by alain brunetot (not verified)

Thank you! :-)
I'm glad to know that you appreciate Steg.

You are right, set the same zoom/position for both the two images is not very comfortable .

I must admit that I was lazy when I wrote that part of code, but because it is the most boring. :-D

I'll take in account your observation. Meanwhile I would suggest you to repeat exactly the same mouse cliks on the scrollbar and on the zoom button for both the images. Not so smart, but it should work.

Thank you Alain, this kind of feedback are useful to me because the testing are not simple to be done on all the systems (and systems versions), in particular for OSX.

alain (not verified)

10 years 7 months ago

Hi Fabio,

It is impossible to enter a password (field remain always in red) in symetric mode.
MacBook Air mid 2012 osx 10.9.5
My best and chao.

stegAdmin

10 years 7 months ago

In reply to by alain (not verified)

You must enter a password in a format that meets the requirements in the tooltip that will appear leaving the mouse pointer on the password insertion form. Let me know. Thanks.

William (not verified)

10 years 5 months ago

Hi Fabio,

I just learned about your program from a reference in Tyler Cohen's defcon talk
http://youtu.be/ESmYO4VMyiw
Very impressive work...you have made such a user friendly tool!

Thanks,
William

stegAdmin

10 years 5 months ago

In reply to by William (not verified)

Hi William.
Thank you very much for your comment. Steg is simple to use but it does some advanced things compared to other free tools...I'm glad you appreciate my effort.
I saw the Tyler Cohen's talk that you indicated. Probably, when she presented the slide with the sentence "Steg photos or music files", she used the word "Steg" as a simple abbreviation of "Steganography" and not as a direct citation of my program. Said that, it is possible she is aware of it. ;-)

Ubah (not verified)

10 years 4 months ago

Please don't "feel ashamed of your coding style".
Open Source adds to credibility of your software. Otherwise, it just another unreliable tool.

alain (not verified)

10 years 3 months ago

Hi Fabio,

What is the purpose of white noise fonction in steg?

My best

stegAdmin

10 years 3 months ago

In reply to by alain (not verified)

From the 6th paragraph of the Steg help "6. Hide Noise":
This command fills all the space available in the media using random generated data according to the current configuration. This is useful to evaluate the worst alteration you can obtain for that media using different configurations. Use the View menu and zoom buttons to evaluate differences between the original media and the tainted one. To make effective visual comparison You can run consecutive tests even though it is not particularly useful. You can undo every modifications using the revert command."

Bye, Fabio.

rms (not verified)

9 years 11 months ago

are there any tools for protocol steg tools for hiding information in network protocols ( basically to simulate network covert channels) .Pls help

Probably they exist but I'm not aware of any such tools, nor free nor commercial (but I've not searched very much). All software for stream multimedia contents are good candidates for example. ;-)

Chris C. (not verified)

9 years 6 months ago

Changes EXIF data!

I tried your tool and was at first impressed by how well it works - however the utility overwrites the EXIF data of pictures, making the resultant file instantly suspicious. Not very good for hiding :-(

Would it be possible to hide the data in the image content itself without modifying the EXIF data at all (including EXIF thumbnails, dates modified, dates accessed, etc.)

Thank you in advance for your comments.

Chris

From the 5.3 paragraph "JPEG configuration"

"Copy AppN Markers: JPEG image header can include some application-specific information called AppN Markers. For example your digital camera or scanner can use this header fields to write the name of the manufacturer, model and/or firmware version of your equipment, or if you make some image editing, your favourite image editor can write other kind of information. If you leave this option unchecked all AppN Markers will be removed from the saved image, otherwise they will be copied. Note that if you open an image and save without hiding any secret data the Markers will be saved or removed the same way. This option does not change the space available to hide data."

Do you tryed this option?

Anyway Exif data can carry some unwanted information about the source of the picture so, personally, I prefer
that they are wipe out.

Thank you for your appreciation. :-)

Fabio

Cynthia H Davidson (not verified)

5 years 9 months ago

The welcome screen and exit confirmation are very annoying. I would suggest an option to run Steg as a portable program: Steg writes all its settings and data in its own folder, not in AppData. World largest best photo outsource company XXXXXXXXXX provide high quality photo retouching service, background removal service, clipping path service, and <a href="https://XXXXXXXXXX/">photo masking service</a> etc.

Hi Cynthia,
I agree in the utility of making Steg more portable by making sure that, optionally, it can save its settings in its own directory. I will consider your observation in possible futures.
For the welcome screen and confirmation of exit of the program ... please be patient. :-)
I apologize but I did not understand what the rest of your message has to do with it: it seems that you want to advertise a company that has nothing to do with steganography. For this reason I removed the direct references to that company replacing them with X.

Adam (not verified)

5 years 2 months ago

Thank you for this software.
But the option "Embed a text message" is not working. When data is extracted, no text file, filled with the embedded text is generated. Please check it.

Hello Adam, thank you for the feedback. I never received a bug report regarding missing text in data extraction and I never experienced this problem. Please be sure to have checked the checkbox "Embed text message" prior to hide data in your picture. ;-) Cheers, Fabio

macUser (not verified)

2 years 2 months ago

unfortunately I'm unable to run Steg on macOS Monterey v12.6.2 "steg.app” cannot be opened because the developer cannot be verified" is the error I'm getting. is there a way around this?

Sanford Burkett (not verified)

1 year 5 months ago

Hi fabionet.org administrator, You always provide great examples and real-world applications, thank you for your valuable contributions.