Crates.io | stegano |
lib.rs | stegano |
version | 0.1.1 |
source | src |
created_at | 2023-12-02 14:36:06.739541 |
updated_at | 2023-12-07 12:33:09.04093 |
description | The ultimate steganography swiss knife army CLI tool. |
homepage | https://github.com/wiseaidev/stegano |
repository | https://github.com/wiseaidev/stegano |
max_upload_size | |
id | 1056169 |
size | 144,991 |
🚀
stegano
: Stegano is a powerful and versatile steganography tool designed to empower you with a wide range of image manipulation and data encryption capabilities.
To install stegano
, use the following Cargo command:
cargo install --locked stegano
IEND - 8
bytes position marker.stegano
provides three subcommands:
$ stegano -h
The ultimate steganography swiss knife army tool.
Usage: stegano [COMMAND]
Commands:
encrypt Subcommand for encryption
decrypt Subcommand for decryption
show-meta Subcommand for showing metadata
help Print this message or the help of the given subcommand(s)
Options:
-h, --help Print help
-V, --version Print version
$ stegano encrypt -h
Subcommand for encryption
Usage: stegano encrypt [OPTIONS] --input <INPUT>
Options:
-i, --input <INPUT> Sets the input file for injecting the payload
-o, --output <OUTPUT> Sets the output file for generating a new file with the injected payload [default: output.png]
-k, --key <KEY> Sets the key for payload encryption [default: key]
-s, --suppress Suppresses output messages
-f, --offset <OFFSET> Sets the offset [default: 10]
-p, --payload <PAYLOAD> Sets the payload [default: hello]
-t, --type <TYPE> Sets the type [default: PNG]
-h, --help Print help
-V, --version Print version
$ stegano decrypt -h
Subcommand for decryption
Usage: stegano decrypt [OPTIONS] --input <INPUT>
Options:
-i, --input <INPUT> Sets the input file for decrypting and extracting the payload
-o, --output <OUTPUT> Sets the output file for generating a new file with no payload, aka restoring the original file [default: output.png]
-k, --key <KEY> Sets the key for payload encryption [default: key]
-s, --suppress Suppresses output messages
-f, --offset <OFFSET> Sets the offset [default: 10]
-p, --payload <PAYLOAD> Sets the payload [default: hello]
-t, --type <TYPE> Sets the type [default: PNG]
-h, --help Print help
-V, --version Print version
$ stegano show-meta -h
Subcommand for showing metadata
Usage: stegano show-meta [OPTIONS] --input <INPUT>
Options:
-i, --input <INPUT> Sets the image input file
-n, --nb-chunks <NB_CHUNKS> Read number of chunks [default: 100]
-s, --start <START_CHUNK> The index of the start chunk to read from [default: 0]
-e, --end <END_CHUNK> The index of the end chunk to stop reading at [default: 100]
-r, --suppress Suppresses output messages
-t, --type <TYPE> Sets the type [default: PNG]
-h, --help Print help
-V, --version Print version
Use these subcommands to process and manipulate png and jpeg images. Here are some examples:
Read and process 10 chunks from a png image:
$ stegano show-meta -i image_file_name -n 10
It is a valid PNG file. Let's process it!
---- Header ----
00000000 | 89 50 4E 47 0D 0A 1A 0A | .PNG....
----- End ------
---- Chunk #0 ----
Offset: 8
Size: 71
CRC: 48142467
00000008 | 00 00 00 0D 49 48 44 52 00 00 05 A0 00 00 03 D0 08 06 00 00 | ....IHDR............
00000028 | 00 C0 52 DC 33 00 00 00 01 73 52 47 42 00 AE CE 1C E9 00 00 | ..R.3....sRGB.......
00000048 | 20 00 49 44 41 54 78 5E EC 9D 07 98 24 45 D9 80 BF DD 0B 5C | ..IDATx^....$E.....\
00000068 | E2 8E 8C 24 C9 41 50 09 82 A8 80 | ...$.AP....
------- End -------
---- Chunk #1 ----
Offset: 83
Size: 17
CRC: 241924a7
00000083 | A2 64 38 B2 81 20 19 91 24 0A 28 48 D2 9F AC 92 91 | .d8.....$.(H.....
------- End -------
---- Chunk #2 ----
Offset: 112
Size: 3
CRC: 9e0e55d5
00000112 | ED D9 EE | ...
------- End -------
---- Chunk #3 ----
Offset: 127
Size: 51
CRC: 400002d6
00000127 | B2 53 5D F5 D5 5B D5 7D C7 3B DF 7E D5 F5 C7 DB EF EF 15 AE | .S]..[.}.;.~........
00000147 | 52 08 F4 F6 82 36 0A 16 1E A5 6C 34 3A 85 00 04 20 00 01 08 | R....6....l4:.......
00000167 | 40 00 02 10 80 00 04 20 00 01 08 | @..........
------- End -------
---- Chunk #4 ----
Offset: 190
Size: 4
CRC: fa7621a0
00000190 | BA E0 51 D6 | ..Q.
------- End -------
---- Chunk #5 ----
Offset: 206
Size: 60
CRC: 1084000
00000206 | FD EF 30 7A 84 00 04 20 00 01 08 40 00 02 10 80 00 04 20 00 | ..0z.......@........
00000226 | 01 08 40 00 02 3E 09 20 5F 03 9A 88 68 9F FB AA D6 17 02 DA | ..@..>.._...h.......
00000246 | 33 53 E4 33 C2 D9 F3 96 A2 3B 08 40 00 02 10 80 00 04 20 00 | 3S.3.....;.@........
------- End -------
---- Chunk #6 ----
Offset: 278
Size: 2
CRC: 5b4823a1
00000278 | 02 03 | ..
------- End -------
---- Chunk #7 ----
Offset: 292
Size: 4
CRC: 3d6e1dba
00000292 | 4B 3E 23 9A | K>#.
------- End -------
---- Chunk #8 ----
Offset: 308
Size: 4
CRC: 42000
00000308 | 00 02 10 80 | ....
------- End -------
---- Chunk #9 ----
Offset: 324
Size: 1
CRC: 886924b4
00000324 | E0 | .
------- End -------
Process the png image in silent mode:
$ stegano show-meta -i image_file_name -r
Read and process a jpeg image.
$ stegano show-meta -i image_file_name -t jpeg
JFIF Header: JfifHeader { version: 18758 }
SOF Header for Chunk#67: SofHeader { jpeg_obj: JpegObj { precision: 8, image_height: 243, image_width: 207, number_of_components: 3, comp_id: [1, 2, 3], hsamp_factor: [2, 1, 1], vsamp_factor: [2, 1, 1], qtable_number: [0, 1, 1], dctable_number: [1, 2, 3], actable_number: [11, 12, 13, 14], ss: 0, se: 63, ah: 0, al: 0 } }
Processing DHT Header for Chunk#68:
Processing DHT Header for Chunk#69:
Processing DHT Header for Chunk#70:
Processing DHT Header for Chunk#71:
SOS Header for Chunk#72: SosHeader { jpeg_obj: JpegObj { precision: 3, image_height: 243, image_width: 207, number_of_components: 3, comp_id: [17], hsamp_factor: [3], vsamp_factor: [15], qtable_number: [0], dctable_number: [0], actable_number: [0], ss: 0, se: 0, ah: 0, al: 0 } }
Sometimes the JFIF
header doesn't exist, but it is still a valid jpeg file:
$ stegano show-meta -i image_file_name -t jpeg
DQT Header for Chunk#1: DqtHeader { dct: DctStruct { quantum: [[8, 2054, 1542, 1543, 1798, 1541, 1288, 2055, 1799, 1799, 1801, 2313, 2312, 2058, 2572, 3092, 5133, 3340, 3083, 2827, 2828, 3097, 6418, 4627, 4879, 3860, 5149, 7450, 6687, 7966, 7709, 7450, 6684, 7196, 7200, 8228, 9262, 11815, 10016, 8226, 8748, 11299, 8988, 7196, 7208, 10295, 14121, 10540, 11312, 12337, 12596, 13364, 13364, 13343, 7975, 10041, 14653, 15672, 14386, 12860, 15406, 11827, 13108, 13362], [12801, 265, 2313, 2313, 2316, 3083, 2828, 3096, 6157, 3341, 3352, 6194, 12833, 8476, 7201, 8498, 12850, 12850, 12850, 12850, 12850, 12850, 12850, 12850, 12850, 12850, 12850, 12850, 12850, 12850, 12850, 12850, 12850, 12850, 12850, 12850, 12850, 12850, 12850, 12850, 12850, 12850, 12850, 12850, 12850, 12850, 12850, 12850, 12850, 12850, 12850, 12850, 12850, 12850, 12850, 12850, 12850, 12850, 12850, 12850, 12850, 12850, 12850, 0]] } }
SOF Header for Chunk#3: SofHeader { jpeg_obj: JpegObj { precision: 8, image_height: 460, image_width: 460, number_of_components: 3, comp_id: [1, 2, 3], hsamp_factor: [2, 1, 1], vsamp_factor: [2, 1, 1], qtable_number: [0, 1, 1], dctable_number: [1, 2, 3], actable_number: [11, 12, 13, 14], ss: 0, se: 63, ah: 0, al: 0 } }
Processing DHT Header for Chunk#4:
SOS Header for Chunk#5: SosHeader { jpeg_obj: JpegObj { precision: 3, image_height: 460, image_width: 460, number_of_components: 3, comp_id: [17], hsamp_factor: [3], vsamp_factor: [15], qtable_number: [0], dctable_number: [0], actable_number: [0], ss: 0, se: 0, ah: 0, al: 0 } }
Read chunks at different positions:
# Read 1 chunk starting from position 0
$ stegano show-meta -i image_file_name -s 0 -e 10 -n 1
It is a valid PNG file. Let's process it!
---- Header ----
00000000 | 89 50 4E 47 0D 0A 1A 0A | .PNG....
----- End ------
---- Chunk #0 ----
Offset: 8
Size: 71
CRC: 48142467
00000008 | 00 00 00 0D 49 48 44 52 00 00 05 A0 00 00 03 D0 08 06 00 00 | ....IHDR............
00000028 | 00 C0 52 DC 33 00 00 00 01 73 52 47 42 00 AE CE 1C E9 00 00 | ..R.3....sRGB.......
00000048 | 20 00 49 44 41 54 78 5E EC 9D 07 98 24 45 D9 80 BF DD 0B 5C | ..IDATx^....$E.....\
00000068 | E2 8E 8C 24 C9 41 50 09 82 A8 80 | ...$.AP....
------- End -------
# Read 3 chunks starting from position 40000
$ stegano show-meta -i image_file_name -s 40000 -e 200000 -n 3
It is a valid PNG file. Let's process it!
---- Header ----
00000000 | 89 50 4E 47 0D 0A 1A 0A | .PNG....
----- End ------
---- Chunk #40000 ----
Offset: 40000
Size: 49
CRC: e3a1975e
00040000 | 16 03 F2 3B 23 05 BD 79 7E AE 37 2D 90 1C E8 B8 4F E7 2E 34 | ...;#..y~.7-....O..4
00040020 | 42 9E 43 55 01 1D 6E 01 6D AD 7E 76 5A 40 CB 6A 6A 6B 2C 87 | B.CU..n.m.~vZ@.jjk,.
00040040 | 87 06 84 5C 1D 8B 60 67 11 | ...\..`g.
------- End -------
---- Chunk #40001 ----
Offset: 40061
Size: 28
CRC: 2200002
00040061 | E3 40 40 07 F1 F6 C2 A1 20 00 02 20 00 02 20 00 02 20 00 02 | .@@.................
00040081 | 20 00 02 20 00 02 20 00 | ........
------- End -------
---- Chunk #40002 ----
Offset: 40101
Size: 17
CRC: 4f13b5a6
00040101 | 11 B1 EC B9 11 A1 9E 89 AC 4A 58 4B D6 32 DB C7 D8 | .........JXK.2...
------- End -------
Encrypt and inject data in an image:
[!NOTE] Stegano automatically identifies the location of the
IEND
marker in a PNG image and injects the payload at a position 8 bytes before the IEND marker by default. This is done to prevent any corruption of the original image.
$ stegano encrypt -i input_image_file_name -k 'pass' -p 'hello' -o output_image_file_name
It is a valid PNG file. Let's process it!
---- Header ----
00000000 | 89 50 4E 47 0D 0A 1A 0A | .PNG....
----- End ------
------- Chunk -------
Offset: 159028
Size: 48
CRC: 13a29bcc
00159028 | 03 AE 73 9D 60 28 1A F1 20 A0 EB 10 39 11 28 9D FC 85 5E DB | ..s.`(......9.(...^.
00159048 | D2 D3 7A 45 B1 71 EE 4F 4C 66 0C E8 FC 85 5E DB D2 D3 7A 45 | ..zE.q.OLf....^...zE
00159068 | B1 71 EE 4F 4C 66 0C E8 | .q.OLf..
-------- End --------
Your payload has been encrypted and written at offset 159028 successfully!
[!NOTE] By default, the maximum key length is restricted to 16 characters.
Using the previously obtained offset, you can decrypt and extract the secret information from an image, as well as remove the secret content from the image:
$ stegano decrypt -i input_image_file_name -k 'pass' -f 159028 -o output_image_file_name -s
Your decrypted secret is: "hello"
if wrong key is provided:
$ stegano decrypt -i input_image_file_name -k 'invalid' -f 159028 -o output_image_file_name
Your decrypted secret is: "qji~s"
if wrong key and wrong offset are provided:
$ stegano decrypt -i input_image_file_name -k 'invalid' -f 159024 -o output_image_file_name
It is a valid PNG file. Let's process it!
---- Header ----
00000000 | 89 50 4E 47 0D 0A 1A 0A | .PNG....
----- End ------
------- Chunk -------
Offset: 159021
Size: 36
CRC: 1348f762
00159024 | F1 B0 E8 48 9E AD 1E 56 A5 82 7C 3B 14 D4 8C 1D E7 1A 90 47 | ...H...V..|;.......G
00159044 | A0 1D D2 90 04 71 2F 01 AA 91 86 6D | .....q/....m
-------- End --------
Your decrypted secret is: "��H��\u{1e}V��|;\u{14}Ԍ\u{1d}�\u{1a}�G�\u{1d}Ґ\u{4}q/\u{1}���m"
if correct key and wrong offset are provided:
$ stegano decrypt -i input_image_file_name -k 'pass' -f 159024 -o output_image_file_name
It is a valid PNG file. Let's process it!
---- Header ----
00000000 | 89 50 4E 47 0D 0A 1A 0A | .PNG....
----- End ------
------- Chunk -------
Offset: 159021
Size: 36
CRC: fc855edb
00159024 | 67 47 07 E6 DC 5D 27 34 CB 51 A4 63 66 C1 C5 F4 5A A2 6B 5C | gG...]'4.Q.cf...Z.k\
00159044 | 28 24 BF 53 BC 21 59 04 1B F6 FC 21 | ($.S.!Y....!
-------- End --------
Your decrypted secret is: "gG\u{7}��]'4�Q�cf���Z�k\\($�S�!Y\u{4}\u{1b}��!"
[!NOTE] By default, Stegano uses the AES-128 encryption algorithm. The maximum key length supported is 16 characters. If you provide a longer key, it will be automatically padded or truncated to fit the required length.
Option | Description |
---|---|
Encryption Options | |
-a or --algo |
Sets the algorithm for encryption (default is "aes"). |
-i or --input |
Sets the input file for encryption. |
-o or --output |
Sets the output file for the encrypted payload (default is "output.png"). |
-k or --key |
Sets the key for payload encryption (default is "key"). |
-s or --suppress |
Suppresses output messages. |
-f or --offset |
Sets the offset (default is 9999999999 for auto injection: IEND - 8 bytes). |
-p or --payload |
Sets the payload (default is "hello"). |
-t or --type |
Sets the type (default is "PNG"). |
Decryption Options | |
-a or --algo |
Sets the algorithm for decryption (default is "aes"). |
-i or --input |
Sets the input file for decryption. |
-o or --output |
Sets the output file for the decrypted payload (default is "output.png"). |
-k or --key |
Sets the key for payload decryption (default is "key"). |
-s or --suppress |
Suppresses output messages. |
-f or --offset |
Sets the offset (default is 9999999999) for auto decryption: IEND - 8 bytes). |
-p or --payload |
Sets the payload (default is "hello"). |
-t or --type |
Sets the type (default is "PNG"). |
Metadata Options | |
-i or --input |
Sets the input image file for metadata extraction. |
-n or --nb-chunks |
Read a specific number of chunks (default is 100). |
-s or --start |
Sets the index of the start chunk to read from (default 0). |
-e or --end |
Sets the index of the end chunk to stop reading at (default 100). |
-r or --suppress |
Suppresses output messages. |
-z or --read-end |
Read from start or end of file (default is reading from the start of image). |
Contributions and feedback are welcome! If you'd like to contribute, report an issue, or suggest an enhancement, please engage with the project on GitHub. Your contributions help improve this crate for the community.
This project is licensed under the MIT License.