Using Pict Encrypt for steganography purposes on Mac OS X
by Andrew Madison - Monday, 18 September 2006.
Steganography is the art and science of writing hidden messages in such a way that no one apart from the intended recipient knows of the existence of the message. Pict Encrypt 2.0 (developed by Pariahware) is very easy to use freeware application using which you can hide your text in any image you want in just a couple of clicks.

The graphical user interface is very straightforward. Upon opening the software you have two options - encrypt and decrypt. There is a slight bug with the navigation buttons that can cause the back and forward icons in the lower right part of the interface to change their appearance. The first time you start the software you will see a question mark and a lock icons which will act as back and forward keys. If you open the same initial screen via File - > New, the icons will look much better and more self explanatory.



Now you need to chose an image file that will be used for hiding purposes. You can use MacPICT, GIF, JPEG, PNG, or TIFF picture formats.



After chosing the file, you need to enter the text. Altough the software has a copy/paste menu, unfortunately the pasting option doesn't work. This is quite bad, because in the majority of situations users would paste in their documents, emails or existing confidential data.



The encryption key must be entered and later shared along with the photo with the party that will decrypt your hidden text.



Saving the image is the last part of the encryption process.



Both the original diner.jpg and diner2.jpg look absolutely the same - this is the newly created image that has secret text hidden inside.



Using the diff utility and checking the file size will show you the obvious difference in the two files.

HNS$ diff dinner.jpg dinner2.jpg

Binary files dinner.jpg and dinner2.jpg differ

HNS$ ls -al dinner*

-rw-r--r-- 1 HNS HNS 177323 Sep 14 12:16 dinner.jpg

-rw-r--r-- 1 HNS HNS 931864 Sep 14 12:26 dinner2.jpg


The decrypting phase is pretty much similar to the encryption procedure. You need to chose "decrypt" and open the image containing the hidden text. Btw, do check out the difference in the back/forward buttons I mentioned earlier.



Enter the decryption key shared to you by the person that used steganography in the first place



If you entered the right key, the hidden text will be shown.

Spotlight

Almost 1 in 10 Android apps are now malware

Posted on 28 July 2014.  |  Cheetah Mobile Threat Research Labs analyzed trends in mobile viruses for Q1 and Q2 of 2014. Pulling 24.4 million sample files they found that 2.2 million files had viruses. This is a 153% increase from the number of infected files in 2013.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Mon, Jul 28th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //