https://github.com/balthazar/oxyo
:eyeglasses: Steganography utility
https://github.com/balthazar/oxyo
image image-processing secret steganography
Last synced: about 1 month ago
JSON representation
:eyeglasses: Steganography utility
- Host: GitHub
- URL: https://github.com/balthazar/oxyo
- Owner: balthazar
- Created: 2016-07-01T08:15:19.000Z (almost 9 years ago)
- Default Branch: master
- Last Pushed: 2016-12-13T20:05:57.000Z (over 8 years ago)
- Last Synced: 2024-04-23T23:46:58.617Z (about 1 year ago)
- Topics: image, image-processing, secret, steganography
- Language: JavaScript
- Homepage:
- Size: 596 KB
- Stars: 2
- Watchers: 2
- Forks: 0
- Open Issues: 1
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
## oxyo [](https://travis-ci.org/Apercu/oxyo)
> oxyopia **\ˌäksēˈōpēə\** — Unusual acuteness of sightThis utility will allow you to hide and reveal things inside/from images using
the least significant bit method.npm i -g oxyo
###### Usage
oxyo -c -o -s [secretFile] -p [password]
Either encode a secret file into an output file based on the carrier image or
decode a previously encoded file into another.
Not providing a secret file implies that the program will attempt a decode of
the carrier image into the output.
You can also provide a password for increased security.For encoding, the carry should be either a `jpg` or `png`, and the output needs
to be a `png`.When decoding, no need to specify the output file extension, it will be automatically added.
###### Example
oxyo -c newyork.png -s secretfile.txt -o encoded.png
Will produce an `encoded.png` image that will look like `newyork.png` when opened, but contains the `secretfile.txt` data.
The secret can be anything.To decode it, simply pass the `encoded.png` file as the carry, and provide a filename without extension as the output.
oxyo -c encoded.png -o output
###### Spec
| 1 bit | 6 bytes | 8 bytes | n bytes |
|:-----------:|:---------:|:-------:|:-------:|
| hasPassword | extension | length | data |