Using Pict Encrypt for steganography purposes on Mac OS X
by Andrew Madison - Monday, 18 September 2006.
Steganography is the art and science of writing hidden messages in such a way that no one apart from the intended recipient knows of the existence of the message. Pict Encrypt 2.0 (developed by Pariahware) is very easy to use freeware application using which you can hide your text in any image you want in just a couple of clicks.

The graphical user interface is very straightforward. Upon opening the software you have two options - encrypt and decrypt. There is a slight bug with the navigation buttons that can cause the back and forward icons in the lower right part of the interface to change their appearance. The first time you start the software you will see a question mark and a lock icons which will act as back and forward keys. If you open the same initial screen via File - > New, the icons will look much better and more self explanatory.



Now you need to chose an image file that will be used for hiding purposes. You can use MacPICT, GIF, JPEG, PNG, or TIFF picture formats.



After chosing the file, you need to enter the text. Altough the software has a copy/paste menu, unfortunately the pasting option doesn't work. This is quite bad, because in the majority of situations users would paste in their documents, emails or existing confidential data.



The encryption key must be entered and later shared along with the photo with the party that will decrypt your hidden text.



Saving the image is the last part of the encryption process.



Both the original diner.jpg and diner2.jpg look absolutely the same - this is the newly created image that has secret text hidden inside.



Using the diff utility and checking the file size will show you the obvious difference in the two files.

HNS$ diff dinner.jpg dinner2.jpg

Binary files dinner.jpg and dinner2.jpg differ

HNS$ ls -al dinner*

-rw-r--r-- 1 HNS HNS 177323 Sep 14 12:16 dinner.jpg

-rw-r--r-- 1 HNS HNS 931864 Sep 14 12:26 dinner2.jpg


The decrypting phase is pretty much similar to the encryption procedure. You need to chose "decrypt" and open the image containing the hidden text. Btw, do check out the difference in the back/forward buttons I mentioned earlier.



Enter the decryption key shared to you by the person that used steganography in the first place



If you entered the right key, the hidden text will be shown.

Spotlight

Operation Pawn Storm: Varied targets and attack vectors, next-level spear-phishing tactics

Posted on 23 October 2014.  |  Targets of the spear phishing emails included staff at the Ministry of Defense in France, in the Vatican Embassy in Iraq, military officials from a number of countries, and more.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Oct 24th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //