Digital Steganography: The art of Hiding Files, Part 3

Dennis Faas's picture

Can Digital Steganography be used with good intent?

Recall --

Last week, I wrote 2 articles on Digital Steganography (pronounced "Stay-Gan-Aw-Gra-Fee"). By definition, Steganography is simply the art of hiding plain data from sight. In the same respect, Digital Steganography is the ability to hide a file inside of another file, called the "carrier file".

Both articles focused on a question sent in from Infopackets Reader John B., who proposed the question, "If I downloaded a jpeg image file from the Internet, and it has a virus hidden inside ... [can the virus execute and cause damage to my computer]?"

As we discovered, a carrier file is harmless. Hidden content contained in a carrier file (in this case, a virus or Trojan) cannot execute arbitrarily. To execute a program which is contained within a carrier file, it must first be extracted using a specialized program.

Getting back to the original question -- "Can Digital Steganography be used with good intent?"

The answer, of course, is "Yes!"

Wait a sec. Why would anyone want to use Digital Steganography?

You can easily solve this question yourself: Do you have any private documents, emails, picture files, or programs stored on your computer and you don't want anyone else to access them?

Over the course of this past week, I came across a program called "Invisible Secrets 4" which is capable of Steganography -- plus a whole lot more.

In short, Invisible Secrets 4 features:

  • An Integrated Help Wizard: Creating a stealthy file is extremely simple (and fun!). Having said that, I was able to create my very first steganographic file in 5 simple steps using the window dialogue.
  • Lock Applications: Do you have a program listed in your Start Menu that you don't want anyone to see? In that case, you'll be happy to know that Invisible Secrets 4 can password protect and remove applications that are listed in your Start Menu!
  • Strong Encryption: Invisible Secrets 4 uses strong encryption algorithms to password protect and encrypt personal data. Side note: An algorithm is a computer techy-term used to describe a method. In this case, an Encryption Algorithm is simply a method used to encrypt (I.E.: secretly code) the content contained in the carrier file.
  • Create Self-Decrypting Packages: Take any file (such as a document) and Invisible Secrets 4 can password protect it. Once the file is password protected, you can send the file to a friend over the Internet. Once your friend receives the file, a password is required to open and execute the file. If the password is incorrect, the file cannot be opened. Neat!
  • The File Shredder: Helps you destroy any file, folder, and Internet traces beyond recovery, including: cache, cookies, URLs, history, and Most Recently Used Files History.
  • Password Management: Safely stores passwords and helps you to create secure passwords.

Where is a good place to Store your self-made Steganographic Files?

Anywhere! After all, these files are practically invisible.

Invisible Secrets 4: Download

Before I wrote this article, I contacted the authors @ NeoByte Solutions and asked if they would be willing to offer a special discount for Infopackets Readers. Invisible Secrets 4 normally retails for $39.95 on the NeoByte Solutions web site (as seen here, next to "Buy Now" button) -- but I managed to finagle an amazing discount of 50% off.

For a limited time only, Infopackets Readers can download Invisible Secrets 4 today for only $19.95. This offer is *only* available through this web site and will expire in 7 days (December 11th, 2003).

So, act now!

Get your copy of Invisible Secrets 4 today using the link below!

Rate this article: 
No votes yet