https://github.com/v411e/steghide
Dockerfile for http://www.steghide.sourceforge.net
https://github.com/v411e/steghide
dataset-generation docker docker-compose steganography steghide
Last synced: 3 months ago
JSON representation
Dockerfile for http://www.steghide.sourceforge.net
- Host: GitHub
- URL: https://github.com/v411e/steghide
- Owner: v411e
- Created: 2022-04-28T15:54:27.000Z (about 3 years ago)
- Default Branch: main
- Last Pushed: 2022-06-01T12:29:59.000Z (about 3 years ago)
- Last Synced: 2025-03-17T16:58:17.175Z (4 months ago)
- Topics: dataset-generation, docker, docker-compose, steganography, steghide
- Language: Shell
- Homepage:
- Size: 5.83 MB
- Stars: 0
- Watchers: 1
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
This container contains a script for performing batch steganography on files with **steghide**.
This would embed the file `embed_file.txt` into every `.wav` file of the `/data` directory contents in the container. The new `_out.wav` files will be created in an extra `out` folder which will be automatically created in the directory where the individual file is.
```bash
docker compose run app -e "embed_file.txt" -p "secret!password" -d "/optional/path/to/data/dir"
```You can test if the steganography was successful with an extra `-t` argument:
```bash
docker compose run app -e "embed_file.txt" -p "secret!password" -d "/optional/path/to/data/dir" -t
```
This extracts the hidden content of all `_out.wav` files in the `/data` directory, compares the extraction with the original `embed_file.txt` and prints a result of the check. The extracted contents are deleted automatically afterwards, but some disk space is required for this operation.