Skip directly to content

Write a comment

Steg comments page preamble: 
Please take in account that your comments need to be approved before they are published. I'll be notified for each new comment with an automatic email. As you can see yourself reading the comments below , I'll not apply any kind of censure on criticism messages. I reject only spam and other kind of junk that sometimes get submitted, despite the chapta. So please, be patient and in few time you'll see your comments published and probably also with an answer. ;-) Thank you in advance.

Comments

Comment (20 rows max, approval required): 
Good day, The download link for Steg for Mac OS X doesn't work. Please send me a working OS X binary at [omissis]@[omissis].[omissis] - I have a file that I created with Steg so I need it! Thank you

Comment (20 rows max, approval required): 
Oh sorry, I discovered that all the download links were no longer valid. Try now! ;-)

Comment (20 rows max, approval required): 
Changes EXIF data! I tried your tool and was at first impressed by how well it works - however the utility overwrites the EXIF data of pictures, making the resultant file instantly suspicious. Not very good for hiding :-( Would it be possible to hide the data in the image content itself without modifying the EXIF data at all (including EXIF thumbnails, dates modified, dates accessed, etc.) Thank you in advance for your comments. Chris

Comment (20 rows max, approval required): 
From the 5.3 paragraph "JPEG configuration" "Copy AppN Markers: JPEG image header can include some application-specific information called AppN Markers. For example your digital camera or scanner can use this header fields to write the name of the manufacturer, model and/or firmware version of your equipment, or if you make some image editing, your favourite image editor can write other kind of information. If you leave this option unchecked all AppN Markers will be removed from the saved image, otherwise they will be copied. Note that if you open an image and save without hiding any secret data the Markers will be saved or removed the same way. This option does not change the space available to hide data." Do you tryed this option? Anyway Exif data can carry some unwanted information about the source of the picture so, personally, I prefer that they are wipe out. Thank you for your appreciation. :-) Fabio

Comment (20 rows max, approval required): 
are there any tools for protocol steg tools for hiding information in network protocols ( basically to simulate network covert channels) .Pls help

Comment (20 rows max, approval required): 
Probably they exist but I'm not aware of any such tools, nor free nor commercial (but I've not searched very much). All software for stream multimedia contents are good candidates for example. ;-)

Comment (20 rows max, approval required): 
Hi Fabio, What is the purpose of white noise fonction in steg? My best

Comment (20 rows max, approval required): 
From the 6th paragraph of the Steg help "6. Hide Noise": This command fills all the space available in the media using random generated data according to the current configuration. This is useful to evaluate the worst alteration you can obtain for that media using different configurations. Use the View menu and zoom buttons to evaluate differences between the original media and the tainted one. To make effective visual comparison You can run consecutive tests even though it is not particularly useful. You can undo every modifications using the revert command." Bye, Fabio.

Comment (20 rows max, approval required): 
Please don't "feel ashamed of your coding style". Open Source adds to credibility of your software. Otherwise, it just another unreliable tool.

Comment (20 rows max, approval required): 
Hi Ubah! Regarding this you can read the answers I wrote for Jörg, Arthur and Pavel in the comments below. Happy new year. ;-)

Comment (20 rows max, approval required): 
Hi Fabio, I just learned about your program from a reference in Tyler Cohen's defcon talk http://youtu.be/ESmYO4VMyiw Very impressive work...you have made such a user friendly tool! Thanks, William

Comment (20 rows max, approval required): 
Hi William. Thank you very much for your comment. Steg is simple to use but it does some advanced things compared to other free tools...I'm glad you appreciate my effort. I saw the Tyler Cohen's talk that you indicated. Probably, when she presented the slide with the sentence "Steg photos or music files", she used the word "Steg" as a simple abbreviation of "Steganography" and not as a direct citation of my program. Said that, it is possible she is aware of it. ;-)

Comment (20 rows max, approval required): 
Is it possible to hide an image inside another image?

Comment (20 rows max, approval required): 
Sure! You can hide any arbitrary data files. To save space, I suggest to compress your data file before.

Comment (20 rows max, approval required): 
Hi Fabio, It is impossible to enter a password (field remain always in red) in symetric mode. MacBook Air mid 2012 osx 10.9.5 My best and chao.

Comment (20 rows max, approval required): 
You must enter a password in a format that meets the requirements in the tooltip that will appear leaving the mouse pointer on the password insertion form. Let me know. Thanks.

Comment (20 rows max, approval required): 
It works perfectly on osx 10.9.5 macbookair mid2012

Comment (20 rows max, approval required): 
Thank you Alain, this kind of feedback are useful to me because the testing are not simple to be done on all the systems (and systems versions), in particular for OSX.

Comment (20 rows max, approval required): 
Hi Fabio, Thanks a lot for your excellent STEG. If it is possible, could you improve sync betwween two pictures when you zoom or move.

Comment (20 rows max, approval required): 
Thank you! :-) I'm glad to know that you appreciate Steg. You are right, set the same zoom/position for both the two images is not very comfortable . I must admit that I was lazy when I wrote that part of code, but because it is the most boring. :-D I'll take in account your observation. Meanwhile I would suggest you to repeat exactly the same mouse cliks on the scrollbar and on the zoom button for both the images. Not so smart, but it should work.

Comment (20 rows max, approval required): 
The welcome screen and the confirmation on exit are very annoying. I would suggest an option to run Steg as a portable program- Steg writing all its settings and data in its own folder, not in AppData. Regards

Comment (20 rows max, approval required): 
Thank you, I will take in account your suggestions for the next release. Cheers.

Comment (20 rows max, approval required): 
Hello I can't find in manual what algorithm do You use to crypt a message. Tell, please. Thank You

Comment (20 rows max, approval required): 
RSA / AES ;-)

Comment (20 rows max, approval required): 
Well, feeling ashamed for your coding style is definitly not a resonable reason for not giving out the source. How can i know that there isn't a backdoor which makes decrypting easy for others (You)? For me a closed source encryption tool seems totally worthless.

Comment (20 rows max, approval required): 
Yes, you're right, Jörg. Any software about cryptography / steganography without source code is "Security by obscurity". Worthless. Software for kids :)

Comment (20 rows max, approval required): 
I'm sorry for your frustration, but if you'll leave your kids to play with Steg I will be glad: at least it will be not so "worthless" as you stated. :-D

Comment (20 rows max, approval required): 
Hello Jörg, maybe you have not sensed the irony in the FAQ page... Anyway, Steg is not (only) a cryptographic tool, but is, in the first place, a steganography tool. It strives to conceal data, not only to make data indecipherable. There are some advantages if you avoid to explicitly explain where you hide something if you want that it will not be discovered. In any case, the decision to publish or not publish the source code is all upon me and I have no obligation to justify myself with any "reasonable reason". Said this, I can understand your concerns. There are no backdoors in Steg, but you are free not to use it, and you can write yourself a software for steganography. Thank you for your visit. Ciao, Fabio.

Comment (20 rows max, approval required): 
Hello I really liked your application. but I need to run It from the command line and the GUI does not fit. Can You make new version - which will be work from command line? or give me source code and I'll try to do it myself can your send me replay to my email: ********

Comment (20 rows max, approval required): 
Thank you for the good feedback! The feature you requested is one of the most intelligent and useful. This would make Steg suitable for use in shell scripts and to be called from another process... I've already considered this future development. Anyway is not exactly immediate to be done, and to be done well. In this period, for other personal priorities, I'm not exactly in the mood of dedicate time to this hobby. From another point of view, more technical, a new major release of the Qt Framework was released and I prefer to wait for a more stable release with a more mature SDK to do the porting of the Steg's source code prior to add other features. When I will put hands on the Steg code, I will remember your request. If one day I'll decide to publish the source code you will be informed. Best regards. Fabio.

Comment (20 rows max, approval required): 
Im still waiting for that...

Comment (20 rows max, approval required): 
I'm still waiting to have the time to develop and release a new version! However there is a little drawback to your request: if implemented, it would permit to use Steg functionalities from another process bypassing any reference to Steg. This is not exactly on top of my wish list. :-D Bye, Fabio.

Comment (20 rows max, approval required): 
Hello how to concat with you? your email is: Delivery to the following recipient failed permanently: ****.contcat@*****.com Technical details of permanent failure: The email account that you tried to reach does not exist. Please try double-checking the recipient's email address for typos or unnecessary spaces. Learn more at http://support.google.com/mail/bin/answer.py?answer=6596

Comment (20 rows max, approval required): 
Hello! The email address you are using is wrong (at least the one you cited in your comment). The correct one is ".contact" and not ".contcat". Please, do not write it in plain text (the way you have done with the wrong address): I published my email address painted on a picture to avoid spammers. ;-) Thank you, Fabio.

Comment (20 rows max, approval required): 
Bello!

Comment (20 rows max, approval required): 
spacca!!

Post new comment

Refresh Type the characters you see in this picture. Type the characters you see in the picture; if you can't read them, submit the form and a new image will be generated. Not case sensitive.  Switch to audio verification.