winzip icon

Steganography with StegaNote 3.1

Submitted on: 2/12/2015 5:11:00 PM
By: D. Rijmenants (from psc cd)  
Level: Intermediate
User Rating: By 20 Users
Compatibility: VB 5.0, VB 6.0
Views: 7119
     StegaNote is the solution to protect and transmit sensitive information on a secure way. StegaNote uses crypto-secure steganography to merge a compressed file, text (from the included text editor) or both file and text with a carrier image, totally invisible for human eye. The technique of RPP, Random Pixel Positioning, ensures that even when it's known that the image is a data carrier, it is impossible to retrieve and compose the original bit sequence. RPP uses a pseudo random generator (PRNG) in feedback mode, initialised by a secret key or passphrase, producing a serie of coordinates to identify the pixels, used to carry the data. This results in a wide spreading of all data bits all over the carrier image. RPP combines fractionation and transposition to achieve the required diffusion, enhance by insertion into a large amount of irrelevant information. A random header is added to the data, to ensure that each encryption - read bit spreading - is unique, even with identical data, key and image. The data bits are stored in the Least significant bit from the primary colors red, green and blue of the image pixels. Therefore, the largest possible change is 1/255th for each seperate colors value of a pixel, leaving it totally invisible. 32Kb of text will only need a 200 X 200 carrier image. An image is a collection of various colors and shades with many different RGB values. The advantage of RPP is that cryptanalysis is impossible, while it is unknow which part of the image is original image, and which part data. Cryptanalysis requires at least the encrypted data. Even comparing the carrier with an original 'blank' version of the image will only show the non equal bits. Many data bits, equal in value to the original image bits, cannot be located. Since the PRNG is in feedback mode, a one-bit error is fatal to the pixel sequence generation. Therefore, retrieving the pixel coordinate sequence by analysis is impossible due to missing encrypted data. Many steganography programs encrypt the data, and then merge the data on a unsecure manner with the image. In that case, filtering the data from the carrier is possible and cryptanalysis can be applied on the retrieved data. Thanks to the RPP technique, retrieving the data is impossible. StegaNote v3.1 is ready to use and has an easy and clear user interface, making it very easy to work with the program. No fancy stuff or graphics, only solid protection. No more, no less. A very informative helpfile is included. Lots of comments in the sourcecode! *** Try out StegaNote! The zip includes a file called TestImage.bmp: Select this image as carrier, hit the read button and enter the word steganography as key. A text and road map are extracted from the carrier image :-O *** All comments or feedback most welcome. (updated 11/3 - v3.1 enabled cancel saving and bmp size warning)

winzip iconDownload code

Note: Due to the size or complexity of this submission, the author has submitted it as a .zip file to shorten your download time. Afterdownloading it, you will need a program like Winzip to decompress it.Virus note:All files are scanned once-a-day by Planet Source Code for viruses, but new viruses come out every day, so no prevention program can catch 100% of them. For your own safety, please:
  1. Re-scan downloaded files using your personal virus checker before using it.
  2. NEVER, EVER run compiled files (.exe's, .ocx's, .dll's etc.)--only run source code.
  3. Scan the source code with Minnow's Project Scanner

If you don't have a virus scanner, you can get one at many places on the net

Other 20 submission(s) by this author


Report Bad Submission
Use this form to tell us if this entry should be deleted (i.e contains no code, is a virus, etc.).
This submission should be removed because:

Your Vote

What do you think of this code (in the Intermediate category)?
(The code with your highest vote will win this month's coding contest!)
Excellent  Good  Average  Below Average  Poor (See voting log ...)

Other User Comments

5/7/2018 4:03:23 PMirfan

do you make steganography EoF?
(If this comment was disrespectful, please report it.)


Add Your Feedback
Your feedback will be posted below and an email sent to the author. Please remember that the author was kind enough to share this with you, so any criticisms must be stated politely, or they will be deleted. (For feedback not related to this particular code, please click here instead.)

To post feedback, first please login.