StegoShare
Encyclopedia
StegoShare is a steganography
Steganography
Steganography is the art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message, a form of security through obscurity...

 tool, that allows to embed large files into multiple images. It may be used for anonymous file sharing
Anonymous P2P
An anonymous P2P communication system is a peer-to-peer distributed application in which the nodes or participants are anonymous or pseudonymous...

.

Features

  • Supports various image formats (png, jpg, bmp, gif, tiff etc)
  • Maximal supported hidden file's size is 2Gb, number of cover images in the set up to 65536
  • Average capacity is 40% (a 100 Mb file could be embedded into a 250Mb image)
  • 128-bit encryption
    Cryptography
    Cryptography is the practice and study of techniques for secure communication in the presence of third parties...

  • Good output images quality (changes undetectable by human eye)

Use in the file sharing networks

This software can be easily used for anonymous file sharing
Anonymous P2P
An anonymous P2P communication system is a peer-to-peer distributed application in which the nodes or participants are anonymous or pseudonymous...

. An uploader downloads legal images from a public photo hosting site, and embeds the censored file into those images. The uploader then uploads pictures to the public photo torrent tracker and puts the links referencing the stego pictures with censored file's description on a forum or blog. Downloaders, seeders, and public photo trackers, if caught distributing illegal files, are protected from legal prosecution, because they can always use plausible deniability
Plausible deniability
Plausible deniability is, at root, credible ability to deny a fact or allegation, or to deny previous knowledge of a fact. The term most often refers to the denial of blame in chains of command, where upper rungs quarantine the blame to the lower rungs, and the lower rungs are often inaccessible,...

, saying that they knew nothing about the illicit file in the images. This is impossible to prove otherwise, as the human eye cannot differentiate between an ordinary image and a picture with hidden embedded file.

External links

The source of this article is wikipedia, the free encyclopedia.  The text of this article is licensed under the GFDL.
 
x
OK