<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>LSB on Chief Dennis' Blog</title><link>https://chiefdennis.github.io/tags/lsb/</link><description>Recent content in LSB on Chief Dennis' Blog</description><generator>Hugo</generator><language>en</language><lastBuildDate>Wed, 01 Jan 2025 15:43:16 +0100</lastBuildDate><atom:link href="https://chiefdennis.github.io/tags/lsb/index.xml" rel="self" type="application/rss+xml"/><item><title>Steganographic techniques, analysis, and usage of S-Tools</title><link>https://chiefdennis.github.io/projects/steganography_and_s-tools/</link><pubDate>Wed, 01 Jan 2025 15:43:16 +0100</pubDate><guid>https://chiefdennis.github.io/projects/steganography_and_s-tools/</guid><description>&lt;h1 id="1--introduction">
 1.- Introduction
 &lt;a class="heading-link" href="#1--introduction">
 &lt;i class="fa-solid fa-link" aria-hidden="true" title="Link to heading">&lt;/i>
 &lt;span class="sr-only">Link to heading&lt;/span>
 &lt;/a>
&lt;/h1>
&lt;p>This post is about steganographic tools and analysis techniques in search of hidden information. In this case, the S-Tools tool is used. We will also use a custom python script to help us analyze the images bit by bit in search for hidden information. Lastly, we will also perform a histogram analysis, coding another custom python script.&lt;/p>
&lt;p>S-Tools is a very powerful tool developed by Andy Brown. It allows you to hide messages using steganography in BMP, GIF, and WAV images. It is a very simple tool that allows drag-and-drop to process the relevant files. Additionally, it can encrypt the hidden information so that even if the message is discovered, the information cannot be decrypted without the password.&lt;/p></description></item></channel></rss>