Before I release Steg Img I would like to go over some basic steganography techniques used in the program. At present Steg Img does 3 different scans. The first scan will test for certain text within the file. For instance if you take any image and open it with a text editor you will see a bunch of characters that make no sense what so ever. However text can be hidden within all the non sense characters.
The second scan will see if the image file contains another file within it. To be more specific using a command prompt you can combine a text file, mp3 file, and many others with the image file. This in no way changes the image file and the image is still able to be viewed with your favorite image viewing software.
The last scan is a bit more complicated. To explain look at the picture below
A pixel is made up of red, blue, and green, or RGB value. The value of either the red, blue, or green can be between 0-255. Download the image and open it in your favorite image manipulation program, and zoom in as far as possible. Next we will be converting the pixels to letters. Use a color picker and choose the first blue pixel of the blue strip. Its R,G,B value is 0,0,112 meaning the pixel has 0 red, 0 green, and 112 blue.
Now if we head over to asciitable.com we can convert the pixels to letters. We can see by using the table that the decimal 112 is = p. Next we will check the second pixel. As you can see it has a value of 0,0,97 which is = a. The last 2 pixels are 0,0,115 which is the letter s.
The reason I used the word “pass” is because if the word “password” is located within the image it would’nt be necessary to search for the whole word since pass is inside password. The algorithm Steg Img currently uses only looks for the word “pass”. Im sure by now you can guess what the other 2 pixel strips say. Keep in mind this is a very basic method and is predicated on having 0 in the other two RGB values.
Hopefully with the next Steg Img update i will have something worth releasing.