Skip to content

Latest commit

 

History

History
75 lines (59 loc) · 2.74 KB

README.md

File metadata and controls

75 lines (59 loc) · 2.74 KB

Steno ➿

Ultimate Steganography software:superhero:

The do all steganography application.:grin:
Formats Supported-

  • Images
  • Audio
  • Text
  • Video To be supported in future version

This is an important application especially in today's world.
We need hide the messages rather than only encrypting them.

Features

  • Hide your private messages in images, audio & text files.
  • Forgot password in case you forget.
    (Click on the 3 dots in main window to know more)
  • Access info about any button just by hovering on it.

homescreen

Using those those 3 dots present in topright of the above window, user can create an account in case they forget the password for their repective hidden messages in files.

Run Locally

Clone the project

  git clone https://github.com/aloner-pro/Steno.git

Go to the project directory

  cd Steno

Other Notes

All modules are standard modules of batteries included python. Then use the main.py. Having Cascadia Code font makes the GUI look best. Rest the GUI is quite explanatory so hope you don't have any problem using this. In audio steganography only .wav files are supported presently. In images are formats are supported.

Roadmap

  • Enabling encryption of data

  • Add more video support


Steganography is not Cryptography ! 😕

If you are getting confused between Steganography & Cryptography. Then see this -

Cryptography

If you = wms then Qcaapgrw gq gknmprylr = ?
Can you guess the answer?
Here we have key = -2 i.e. if we go 2 alphabets behind y you get w and similarly if you go 2 alphabets behind o we get m and similarly 2 alphabets behind u gives us s. Therefore you = wms.
So now you may have got the answer which is Security is important.

Note: The cryptography algorithms are much advanced now.

Steganography

So now that you know what is cryptography so lets know what is Steganography.
If ____=____ then ______=______ ?
Confused ?
Here you won't be able to even sense the presence of data. Leave alone knowing what is the data. That's why it is called hiding data in plain sight. There are some applications which may detect the presence of hidden data. CIA obviously has it
Generally at professional level the data hidden is encrypted first. So steganography and cryptography are not mutually exclusive to each other.

Knowledge fact: Jeff Bezos's mobile was hacked by hiding malicious code in a media file which on getting downloaded sent the host device's control to the hacker.


License

MIT