info@embeddedsw.net | +1 949-613-5099 Skype |
Embedded SWDelivering Advanced & Reliable Innovation |
Home > Software > OpenPuff Steganography
OpenPuff - Yet not another steganography SW
German introduction by users & Internet reviews.
OpenPuff ist ein Steganographie Tool mit hochsicherer Mehrfach-Verschlüsselung, welches sensible Daten verschlüsselt und in anderen Dateien versteckt:
OpenPuff kann sensible Dateien auf mehrere Trägerdateien verteilen (sofern Sie genug Trägerdateien zur Verfügung haben) und die letzte Trägerdatei mit Zufallszahlen auffüllen, so dass diese sich nicht von anderen Trägerdateien unterscheidet. OpenPuff Trägerdateien:
OpenPuff ist auch als installationsfreie Portable Anwendung erhältlich, die darüber hinaus auch im sogenannten "Stealth Modus" verdeckt arbeitet. |
OpenPuff is a professional steganography tool with unique features, suitable for highly sensitive data covert transmission.
Carrier chains:
Data is split among many carriers. Only the correct carrier sequence enables unhiding. Moreover, up to 256Mb can be hidden, if you have enough carriers at disposal. Last carrier will be filled with random bits in order to make it undistinguishable from others.Supported formats:
Images, audios, videos, flash, adobe.Layers of security:
Data, before carrier injection, is encrypted (1), scrambled (2), whitened (3) and encoded (4).
Layer 1 - Modern multi-cryptography:
A set of 16 modern 256bit open-source cryptography algorithms (chosen from AES Process [1997-2000], NESSIE Process [2000-2003] and CRYPTREC Process [2000-2003]) has been joined into a doublepassword multi-cryptography algorithm (256bit+256bit):AES / Anubis / Camellia / Cast-256 / Clefia / FROG / Hierocrypt3 / Idea-NXT / MARS / RC6 / Safer+ / SC2000 / Serpent / Speed / Twofish / Unicorn-ALayer 2 - CSPRNG based scrambling:
Encrypted data is always scrambled to break any remaining stream pattern. A new cryptographically secure pseudo random number generator (CSPRNG) is seeded with a third password (256bit) and data is globally shuffled with random indexes.Layer 3 - CSPRNG based whitening:
Scrambled data is always mixed with a high amount of noise, taken from an independent CSPRNG seeded with hardware entropy.Layer 4 - Adaptive non-linear encoding:
Whitened data is always encoded using a non-linear function that takes also original carrier bits as input. Modified carriers will need much less change and deceive many steganalysis tests (e.g.: chi square test).
Extra security - Deniable steganography:
Top secret data can be protected using less secret data as a decoy.Source code:
This program relies on the libObfuscate system-independent open-source library. Users and developers are absolutely free to link to the core library (100% of the cryptography & obfuscation code), read it and modify it.
VIDEO TUTORIALS & YOUTUBE
Thanks so much to the huge amount of time that people worldwide invested in creating these nice videos about OpenPuff.
|
|
[English] v4.00 AndyLuse Trovisto LabMentorsOnline StationX ParthToliya VT360 JhadVasquez
[English] v3.40 KStevens PCForGeek
[Arabic] v4.00 Almohtarif TheProfessional BouanzoulImad
[Portuguese] v4.00 FabricaDeNoobs ProfessorRamos HackerVid4Lok4 SlyteTech Plastyne
[Portuguese] v4.00 AlexanderLopez EvaldoWolkers BosonTreinamentos
[Spanish] v4.00 EbmInformatica OscarDavid MSC Vedark DianaAvila v3.30 Roberto De Paz
[Vietnamese] v4.00 KimUyenNguyenThi BinhNguyenXuan XuanKhangVo LocPham BaoTranQuoc CaoVietTran
[German] v3.40 SemperVideo
[French] v4.00 PafLeGeek v3.20 ChaineArtupConcept
[Polish] v4.00 Zer0Cool
[Turkish] v4.00 EmreTufan SahinGoz
[Italian] v4.00 WeTech
A lot of work has been published about OpenPuff since the beginning of the project, back to version 1.01 released on December 2004. Some of the following papers describe new brilliant research in the steganography/steganalysis field, that will be surely included in the upcoming versions of OpenPuff.
FOR EXPERTS (difficulty: advanced)
Steganography and amazon cloud drive - ( Brent Muir )
L00F group hacked NASA and shared top secret data - ( SecurityZap )
Meet the man who solved the mysterious cicada 3301 puzzle - ( Michael Grothaus )
Cicada 3301 update - ( ClevCode )
Cicada 3301 recruitment puzzle 2014 - ( Wikia )
Cicada 3301 the bay of pigs encrypted message 2017 - ( Steemit )
Full course of steganography - ( Cryptoworld )
PAPERS & ARTICLES (difficulty: advanced)
Constructing good covering codes for applications in steganography
( by Jurgen Bierbrauer, Jessica Fridrich @ Binghamton University )Thwarting audio steganography attacks in cloud storage systems
( by Bo Liu, Erci Xu, Jin Wang, Ziling Wei, Liyang Xu, Baokang Zhao, Jinshu Su @ National University of Defense )Audio_steganography via cloud services integrity analysis of hidden file
( by Ashar Neyaz, Cihan Varol @ Sam Houston State University )Steganography analysis efficacy and response time of current steganalysis software
( by Jordan Green, Ian Levstein, Robert J. Boggs, Terry Fenger @ Marshall University )Watermarks an in depth discussion
( by Allison Nixon, Manuel Pelaez @ SANS Information Security Institute )Optimal image steganography content destruction techniques
( by Siddeeq Y. Ameen, Muthana R. Al-Badrany @ University of Mosul )Digital forensic tools a comparative approach
( by Dhwaniket R. Kamble, Nilakshi Jain @ University of Mumbai )An examination on information hiding tools for steganography
( by Ismail Karadogan, Resul Das @ Firat University )Evaluation von heuristiken zur erkennung von kryptoroutinen in software
( by Felix Matenaar @ RWTH Aachen University )Construction of a mathematical model to determine the laws of statistical characteristics of LSBs wave
( by Irina. A. Kochevsky @ Ukranian National University )Steganography and desteganography overview
( by Anna A. Kukhareva @ Moscow State Technical University )Steganography in on line social networks
( by Deniz A. Eminov, Selime I. Hasanova, Dragan S. Tonchev @ University of Shumen )Network-based steganography using encryption in TCP/IP header
( by Joshi Rana, Amanpreetkaur, Nitin Malik @ ITM University Gurgaon )Patent application publication US 2015/0047037 A1
( by Charles Wood @ Duquesne University )Simulasi algoritma steganografi dengan software openpuff
( by Naufal A. Farauq @ Negeri Semarang University )Data hiding and steganography annual report 2012
( by Chet Hosmer @ WetStone Technologies )Steganography techniques qualitative and quantitative assessment
( by Dragos Dumitrescu, Ioan-Mihail Stan, Emil Simion @ Bucharest Politehnica University )Steganalysis algorithm for png images based on fuzzy logic technique
( by Jawaher alqahtani, Daniyal Alghazzawi, Li Cheng @ King Abdulaziz University )Integrasi metode steganografi dcs pada image dengan kriptografi blowfish
( by Ermadi Satriya Wijaya, Yudi Prayudi @ Islam Indonesia University )Data hiding exposing concealed data in multimedia operating systems
( by Michael Raggio, Chet Hosmer @ Syngress - SciTech Connect )
THESIS (difficulty: advanced)
Investigating steganography in audio stream for network forensic investigations detection and extraction
( by Yao Lu @ AUT University )StegChat a synonym substitution based algorithm for text steganography
( by Joseph Gardiner @ University of Birmingham )Stegexpose a tool for detecting LSB steganography
( by Benedikt Boehm @ University of Kent )Praticas anti forense um estudo de seus impactos na forense computacional
( by Jadilson A. de Paiva @ University Unibratec )Information hiding using steganography techniques and tools
( by Asoumanaki Anna @ University of Crete )Digital forensic in security of information system based on linux and windows platforms
( by Vanja M. Korac @ University of Belgrade )Research into 4 layers security and apply for steganography
( by Phan Thanh Trung @ University of People's Public Security )Integration testing with steganographic tools
( by Saugata Dutta @ OPJS University )
LECTURES (difficulty: medium)
Privacy of communication - ( Mid Sweden University )
Antiforensics aka digital security - ( Bridgewater State University )
Information security survey and copyright management information hiding - ( University of China )
An overview on hiding and detecting stego data in video streams - ( University of Amsterdam )
Securite des reseaux steganographie et tatouage numerique - ( University Francois-Rabelais de Tours )
Penetration testing lab - ( Pennsylvania State University )
Information security course shivaji - ( Shivaji University )
Ethical hacking and countermeasures v8 - System hacking - ( EC-Council )
Tools for teaching security - ( Western Kentucky University )
Steganography - ( University of Surabaya )
Steganography the art of hidden writing - ( UMass Lowell University )
Workitorial on vision of the unseen - ( University of Campinas )
Cybersecurity breakout overview - ( University of Hawai'i Maui )
Introduction to steganography - ( University of Okara )
Introduccion a la criptologia - ( Technical University of Monterrey )
Steganography and Steganalysis past present and future - ( University of Campinas )
Steganography the art of message hiding - ( Berea College )
Manuale sulla sicurezza informatica e hacking etico - ( Stefano Novelli )
Malware command and control channels - a journey into darkness - ( Brad Woodberg )
Beginner guide to cryptography - ( TheBestVpn )
Finding stegomalware in an ocean of apps - ( RootedCon )
Esteganografia utilizando o openPuff - ( Fabrica de Noobs )
OpenPuff steganography and watermarking tool - ( Michael Chesbro )
Gerenciamento e seguranca de dados - ( Wanderson Reis )
Identifying and cracking steganography programs - ( Michael Raggio )
Deep neural networks for social stego - ( Michael Raggio )
Analyzing steganography softwares - ( Guillermito )
WEB REVIEWS (difficulty: easy)
Tools for the paranoid - ( Erez Zukerman )
Best free steganography program - ( Ashraf )
Keeps files from prying eyes and maybe even from you - ( Mike Williams )
Hackers exfiltrating data with video steganography - ( Ken Westin )
How to hide data in images - ( Ravi Sinha )
Steganography and digital watermarking tools - ( Mourad Ben Lakhoua )
Free encryption and marking software - ( Abhishek Gupta )
Steganogaphy and hidden watermarks - ( Hacker10 )
How to hide the computer important files - ( Ppcn )
Tecniche e strumenti di antiforensics - ( Wiliam David Tanzer )
Come usare la steganografia per proteggere i dati sensibili - ( Animatic )
La steganografia comunicare come una spia - ( ZioGeek )
La steganografia in pratica - ( Tecnologichevolmente )
Nascondere documenti in un immagine - ( Michele Nasi )
Come nascondere messaggi nelle immagini e nei video - ( Fabrizio Cannatelli )
Esteganografia conceito e pratica - ( Diego Mendes Rodrigues )
La esteganografia el viajero oculto de la criptologia - ( Oscar de la Cuesta )
O que e esteganografia - ( Fabio dos Reis )
Camufla archivos detras de otros archivos - ( Ruben Andres )
Esteganografia oculta archivos - ( Manuel Escudero )
Macht dateien praktisch unauffindbar - ( KronenZeitung )
Computergestuetzte steganographie - ( Fabian Dennler )
Was ist steganographie - ( Kowabit )
Steganographie - ( Realasmodis )
Szteganografia - ( Meszaros Csaba )
REFERENCE IMAGES FOR STEGANOGRAPHY TESTING (difficulty: advanced)
All images in this section are high-quality, free of DCT artifacts and absolutely free to be used, cited, edited for any academic or software steganography-related development. Provided formats are BMP, JPG, PNG, RAW at 8/8/8 bit RGB color and 8 bit Greyscale, 512x512 and 256x256 resolution. All EXIF and ICC metadata info has been removed, to easily check if a steganography tool is actively adding metadata to a carrier. Artificial, NASA, Natural and Portrait images let you test the performance of a steganography implementation in different scenarios.
BMP: All 512x512x3/512x512x1/256x256x3/256x256x1 Artificial/NASA/Natural/People images (.ZIP 30.0MB)
JPG: All 512x512x3/512x512x1/256x256x3/256x256x1 Artificial/NASA/Natural/People images (.ZIP 21.7MB)
PNG: All 512x512x3/512x512x1/256x256x3/256x256x1 Artificial/NASA/Natural/People images (.ZIP 29.3MB)
RAW: All 512x512x3/512x512x1/256x256x3/256x256x1 Artificial/NASA/Natural/People images (.ZIP 39.8MB)
|
|
|
|
|
|
|
|
|
|
512x512 RGB B&W 256x256 RGB B&W | 512x512 RGB B&W 256x256 RGB B&W | 512x512 RGB B&W 256x256 RGB B&W | 512x512 RGB B&W 256x256 RGB B&W | 512x512 RGB B&W 256x256 RGB B&W |
512x512 RGB B&W 256x256 RGB B&W | 512x512 RGB B&W 256x256 RGB B&W | 512x512 RGB B&W 256x256 RGB B&W | 512x512 RGB B&W 256x256 RGB B&W | 512x512 RGB B&W 256x256 RGB B&W |
512x512 RGB B&W 256x256 RGB B&W | 512x512 RGB B&W 256x256 RGB B&W | 512x512 RGB B&W 256x256 RGB B&W | 512x512 RGB B&W 256x256 RGB B&W | 512x512 RGB B&W 256x256 RGB B&W |
512x512 RGB B&W 256x256 RGB B&W | 512x512 RGB B&W 256x256 RGB B&W | 512x512 RGB B&W 256x256 RGB B&W | 512x512 RGB B&W 256x256 RGB B&W | 512x512 RGB B&W 256x256 RGB B&W |
512x512 RGB B&W 256x256 RGB B&W | 512x512 RGB B&W 256x256 RGB B&W | 512x512 RGB B&W 256x256 RGB B&W | 512x512 RGB B&W 256x256 RGB B&W | 512x512 RGB B&W 256x256 RGB B&W |
512x512 RGB B&W 256x256 RGB B&W | 512x512 RGB B&W 256x256 RGB B&W | 512x512 RGB B&W 256x256 RGB B&W | 512x512 RGB B&W 256x256 RGB B&W | 512x512 RGB B&W 256x256 RGB B&W |