This how-to was made for Linux user. The user will need p7zip, exiv2 and optionally exif, exiftool, unzip.
Create an AES-256 encrypted zip file#
7z (p7zip for Linux) can produce zip-format archives with encryption scheme.
To add file.txt to archive.zip and cipher zip data with AES-256 :
To uncompress unzip -p THE_PASSWORD archive.zip
or 7za e archive.zip
and provide password. It may also work with GUI archive manager.
Hide the zip into the image#
To do so, concatenate the zip an image data:
Now check file type:
It seems like a normal jpeg image.
But make a strings
on it and see files that are in the zip (filenames in the zip are not ciphered, only their content is):
The image is an archive too, so it can be extracted.
Let's compare original zip archive and the jpeg one.
Original zip archive:
Jpeg zip archive:
To really extract the archive use unzip -p
, 7za e
or a GUI archive manager like explained in the previous part.
Hide the archive password into image metadata#
Here we'll hide password in image comment, it's not safe at all but it's just for fun.
We'll hide the real password into jpeg comment and a fake password into exif user comment.
Hide the password into jpeg comment:
Hide a fake password into exif user comment:
Jpeg comment can be seen with:
Exif user comment can be seen with:
More datails are avaible at exiv2 manpage.
Why two different passwords and two different comments#
As I said put the password in metadata is not safe, everyone aware of steganography will know how to find it. But we can get confused more novice people.
Novice in steganography often use only default behaviour of tools commands like exiftool
, exif
or less often exiv2
.
exif
and exiv2
default behaviour without options show only exif data but exiftool
will show Exif, IPTC, XMP and image type dependent data.
So novice that will only run exif new_image.jpg
or exiv2 new_image
will only see the fake password hidden in exif user comment:
But