Skip to main content

Stega Shade CLI is a user-friendly command-line interface tool designed for image-based steganography. With a focus on simplicity and security, it provides functionality to encode and decode messages into images, including password-protected encoding for enhanced privacy. The tool is built using Python and leverages robust algorithms to ensure data integrity and secrecy.

Project description

Stega Shade CLI 📷

Help Screen

Overview

Stega Shade CLI is a user-friendly command-line interface tool designed for image-based steganography. With a focus on simplicity and security, it provides functionality to encode and decode messages into images, including password-protected encoding for enhanced privacy. The tool is built using Python and leverages robust algorithms to ensure data integrity and secrecy.


Features

  • Simple Steganography: Encode and decode messages into images without requiring additional security layers. Perfect for casual use cases.

  • Protected Steganography: Password-protected encoding ensures only authorized users can decode the hidden message. Uses AES encryption for robust security.

  • User-Friendly Interface: Intuitive CLI with a visually appealing help guide powered by the rich library.

  • Error Handling: Graceful handling of incorrect inputs and error scenarios with helpful feedback.


Installation

pip install stegashade

Commands and Usage

Help Command

Displays all available commands and their descriptions.

stegashade help

Commands and Usage

Encode Simple

Embed a simple message into an image.

stegashade encode_simple <image_path> <output_path> <data>

Example

stegashade encode_simple input.png output.png "Hello, world!"

Decode Simple

Extract a message embedded using simple steganography.

stegashade decode_simple <image_path>

Example

stegashade decode_simple output.png

Encode Protected

Embed a password-protected message into an image.

stegashade encode_protected <image_path> <output_path> <data> <password>

Example

stegashade encode_protected input.png output.png "Secret Data" "my_secure_password"

Decode Protected

Extract a password-protected message from an image.

stegashade decode_protected <image_path> <password>

Example

stegashade decode_protected output.png "my_secure_password"

How It Works

Simple Steganography

  1. The algorithm encodes the binary representation of a message into the least significant bits (LSBs) of pixel values in the image.
  2. Minor changes in the LSBs are imperceptible to the human eye, keeping the message hidden without noticeably altering the image.

Protected Steganography

  1. The message is encrypted using AES encryption before embedding it into the image.
  2. AES (Advanced Encryption Standard) ensures that the embedded data is highly secure and accessible only with the correct password.
  3. The encrypted data is then processed similarly to the simple steganography method, embedding it into the image’s pixel values.

Allowed Characters for Messages

Due to the limitations of the algorithm, only a specific set of characters can be used in messages:

  • Letters: A-Z, a-z
  • Numbers: 0-9
  • Punctuation Marks: ! @ # $ % ^ & * ( ) _ + - = [ ] { } | ; : ' , . < > / ? ~
  • Whitespace: Spaces

Note: Non-ASCII characters, emojis, or extended Unicode are not supported.


Advantages of Stega Shade

  1. Data Security:

    • Protected steganography leverages AES encryption, requiring a password for decoding. This ensures that only authorized users can access the hidden data.
  2. Image Integrity:

    • The algorithm makes minimal changes to the pixel values, maintaining the image quality while embedding the message.
  3. Versatility:

    • Supports both simple steganography (for casual use) and protected steganography (for secure communications).
  4. Efficiency:

    • Processes images efficiently, even for large file sizes, making it suitable for practical applications.
  5. Rich CLI Interface:

    • Provides a visually appealing command-line experience with clear instructions and error feedback, thanks to the rich Python library.

Why Is It Unique?

  • Dual Modes: Offers both simple and AES-encrypted steganography, catering to users with varying security needs.
  • AES Encryption: Ensures strong encryption, adding an advanced layer of security to embedded messages.
  • User Experience: The CLI tool is intuitive, visually engaging, and user-friendly, making it accessible to both beginners and experts.
  • Minimal Impact: Maintains the original image’s visual fidelity while effectively hiding the message.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

stegashade-0.3.tar.gz (8.8 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

stegashade-0.3-py3-none-any.whl (9.1 kB view details)

Uploaded Python 3

File details

Details for the file stegashade-0.3.tar.gz.

File metadata

  • Download URL: stegashade-0.3.tar.gz
  • Upload date:
  • Size: 8.8 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/4.0.2 CPython/3.10.12

File hashes

Hashes for stegashade-0.3.tar.gz
Algorithm Hash digest
SHA256 bb708e287cfbaf44e18bf315fc6d5c322e6a6945abe5ddeff8b38995be6908b2
MD5 f53f5ed9416f9f1fcea597e729b48d14
BLAKE2b-256 6bfede07a8038c6a244789c84feedac6d12ca46aedc48931668dfc46d6981110

See more details on using hashes here.

File details

Details for the file stegashade-0.3-py3-none-any.whl.

File metadata

  • Download URL: stegashade-0.3-py3-none-any.whl
  • Upload date:
  • Size: 9.1 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/4.0.2 CPython/3.10.12

File hashes

Hashes for stegashade-0.3-py3-none-any.whl
Algorithm Hash digest
SHA256 44ab7425affa0f827c2222716878107236b0827d67d9b27abbc5ffcd84dcfd8c
MD5 440d3dd5d21e36146bdfce9bf0e848ad
BLAKE2b-256 96285ebaab48b86ddf3141f935a6ec8727e55952116c6492f137331e1a81c8cd

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page