This how-to was made for Linux user. The user will need p7zip, exiv2 and optionally exif, exiftool, unzip.
Create an AES-256 encrypted zip file
7z (p7zip for Linux) can produce zip-format archives with encryption scheme.
To add file.txt to archive.zip and cipher zip data with AES-256 :
unzip -p THE_PASSWORD archive.zip or
7za e archive.zip and provide password. It may also work with GUI archive manager.
Hide the zip into the image
To do so, concatenate the zip an image data:
Now check file type:
It seems like a normal jpeg image.
But make a
strings on it and see files that are in the zip (filenames in the zip are not ciphered, only their content is):
The image is an archive too, so it can be extracted.
Let's compare original zip archive and the jpeg one.
Original zip archive:
Jpeg zip archive:
To really extract the archive use
7za e or a GUI archive manager like explained in the previous part.
Hide the archive password into image metadata
Here we'll hide password in image comment, it's not safe at all but it's just for fun.
We'll hide the real password into jpeg comment and a fake password into exif user comment.
Hide the password into jpeg comment:
Hide a fake password into exif user comment:
Jpeg comment can be seen with:
Exif user comment can be seen with:
More datails are avaible at exiv2 manpage.
Why two different passwords and two different comments
As I said put the password in metadata is not safe, everyone aware of steganography will know how to find it. But we can get confused more novice people.
Novice in steganography often use only default behaviour of tools commands like
exif or less often
exiv2 default behaviour without options show only exif data but
exiftool will show Exif, IPTC, XMP and image type dependent data.
So novice that will only run
exif new_image.jpg or
exiv2 new_image will only see the fake password hidden in exif user comment: