https://github.com/beatsbears/steg
Steg is a simple python library for hiding and extracting messages from losslessly compressed images using least-significant-bit (LSB) steganography.
https://github.com/beatsbears/steg
Last synced: 3 months ago
JSON representation
Steg is a simple python library for hiding and extracting messages from losslessly compressed images using least-significant-bit (LSB) steganography.
- Host: GitHub
- URL: https://github.com/beatsbears/steg
- Owner: beatsbears
- License: mit
- Created: 2018-08-25T19:32:14.000Z (over 7 years ago)
- Default Branch: master
- Last Pushed: 2023-10-03T23:33:03.000Z (over 2 years ago)
- Last Synced: 2025-12-07T04:57:25.241Z (3 months ago)
- Language: Python
- Size: 191 KB
- Stars: 33
- Watchers: 4
- Forks: 16
- Open Issues: 1
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
- cybersources - steg
README
# Steg
[](https://ochrona.dev)
Steg is a simple python library for hiding and extracting messages from losslessly compressed images using least-significant-bit (LSB) steganography. Current supported image formats include PNG, TIFF, BMP, and ICO.
Steg also includes a command line tool for quick hiding and extraction.
## Installation
```
$ pip install steg
```
## Usage in Code
```
# Import library
from steg import steg_img
# Hiding
# Select your payload and carrier files
s = steg_img.IMG(payload_path=, image_path=)
# Create a new image containing your payload
s.hide()
# Extracting
# Select the carrier image
s_prime = steg_img.IMG(image_path=)
# Extract the payload
s_prime.extract()
```
## Commandline Usage
1. To hide a payload in an image:
```$ steg -c -p ```
2. To extract a payload from a carrier:
```$ steg -c ```