Competitors

There are other apps, not many, that proposes the steganography as a means of hiding data.

All of these apps

  • implement data hiding to send protected message to third parties;
  • are concept proof more adapt to a tech-person with a specific background;
  • encrypt (e.g. with a standard AES algorithm) the message before injection;
  • one integrates several cryptography algorithms and the F5 steganography one
    • the latter has been accused by a review that point the index again the app, s/he highlights, send a message without his/her knowledge: in fact, this is an open issue, the app credibility must be built over time;

Most of these apps

  • exploit the basic LBS ( Least Significant Bit) technique to hide the data into an image:
    • LSB affects the image pixel and works with bitmap images (BMP) either colored or grayscale. BMP is usually larger than the correspondent JPEG;
    • LSB is detectable by steganalysis methods, i.e. an attacker can understand if an image contains a message;
    • LSB exhibits, in general, higher image capacity F5;
    • LSB is not robust to image data changes, any size or color based change destroy the hidden message.

None of these 

  • declare compliance with information security laws.

s-Note

  • would take the steganography to anyone; it helps the user to understand the steganography in threes steps: select an image, digit a password (bud a default password is inserted for him/her just in case the user forget it) while it embeds all steganography complexity in a save;
  • enable data hiding mechanism for user private information (PIN code, a contact, an event or a small file with important synthetic information) while it allows also eventually send them to third parties (it is well known that full-size image will require bandwidth and sending them will take usually time to the user);
  • implements a modified version of the complex F5 algorithm:
    • F5 affects the image of DCT JPEG coefficients.
    • F5 is hardly detectable by stego-analysis methods, i.e. an attacker cannot understand if an image contains a message.
    • F5 modified to make the attacker task more difficult.
    • F5 is not robust to image data changes, any size or color based change destroy the hidden message.
  • is compliant to the US and France laws.
  • encrypt data before injection with AES.