Steg is a cross-platform portable software written in C++ which is used to hide your confidential data inside compressed or uncompressed images. It supports JPEG (JPG), TIFF, PNG, BMP image formats. It comes with a GUI interface and you don’t have to install it. Just download the software, extract and use it.
Download the Steg software here. Or use the following command to download.
For 32bit systems:
[email protected]:~$ wget https://googledrive.com/host/0B-_yxJMDtRxyRDNGNk1YcXR0UTg/steg-v220.127.116.11-linux32.tgz
For 64bit systems:
[email protected]:~$ wget https://googledrive.com/host/0B-_yxJMDtRxyUExLZzZ3S2VDbjQ/steg-v18.104.22.168-linux64.tgz
Extract the zip file that you have downloaded. Open the executable file called steg in the extracted folder. Accept the License Agreement.
The default interface will look like below.
Go to File -> Open Generic Image or Open JPEG Image. I suggest you to select big size images, so that you can hide big files. Once you opened the image in Steg, you will see the available space to hide your data at the bottom. You can hide the data depending upon the available space.
Now select the file you want to hide inside the image. To do that, go to Hide -> Hide Data from the Menu bar. Select the file you want to hide. Here i select my Resume.
Also you can set the embedded text message with encrypted image. To do that go to Edit -> Configuration and enter your text message in the Common Options box. Select the Crypto Mode you want to use.
Steg gives the following cryptography methods.
The data will be encrypted but no PassPhrase or keys will be required to extract data.
when you hide data, data will be encrypted with the provided PassPhrase and the same PassPhrase is required to extract.
when you want to hide data (you are the sender) only the receiver’s public key is required. When you want to extract data (you are the receiver) only your private key is required.
when you want to hide data (you are the sender) the receiver’s public key and your private key are required. When you want to extract data (you are the receiver) only your private key is required but the sender’s public key is requested. If you don’t provide the sender’s public key, at the end of the the extraction process, you will be warned that the sender identity is not verified. If you provide the sender’s public key you will be informed if sign verification is succeeded.
Finally click on Save button in the Tool bar to save the encrypted image. Enter the file name to save.
You can view the hidden data inside image by extracting the image. To do that, open the encrypted image using Steg. Go to Extract -> Extract hidden Data form the menu bar. It will ask you to where you want to save the extracted files. Select the destination folder to extract and click Choose.
Now you will get hidden data inside the image.
For information about Steg, i suggest you to read the official manual page.