🕵️ Image Steganography
Hide secret messages inside images entirely in your browser with LSB (least-significant-bit) steganography, optional AES-GCM-256 encryption (PBKDF2-SHA-256 100k rounds), and optional gzip compression — output is always lossless PNG. Live capacity meter, accepts JPEG/PNG/WebP/BMP covers (JPEG triggers a warning, alpha auto-flattened to white), round-trip self-verify after embedding confirms the payload will decode. Extract distinguishes three states clearly: no-payload / wrong-password / corrupted. Four upload paths (drag / paste / gallery / camera), bilingual zh/en UI, 44px mobile touch targets, iOS Safari 16MP canvas guard. Client-side processing; images and passwords are not uploaded by the tool.
Mode
① Choose Cover Image
Drop an image, click to choose, or paste with Ctrl+V
PNG recommended (lossless). Supports JPG / WebP / BMP; max 25 MB; max 16 MP (iOS canvas cap)
③ Security Options (optional)
Encryption uses AES-GCM-256 + PBKDF2-SHA-256 (100,000 iterations). Strength hint appears below once you type.
💡 What this is / what it protects / what it does not
LSB steganography hides your secret inside the least-significant bits of each pixel's RGB channels. It's invisible to the naked eye, but anyone who knows the exact algorithm can read it back.
What this tool DOES protect:
- ✅ Casual inspection: The stego image looks identical to the original.
- ✅ Confidentiality (with password): AES-GCM-256 encryption ensures that even if someone knows there's a payload, they can't read it without the password.
- ✅ Integrity: AES-GCM's built-in auth tag fails if the stego image has been modified.
What this tool DOES NOT protect:
- ❌ Forensic steganalysis: Statistical attacks (chi-square, RS-analysis) can detect that LSBs were modified — this is an inherent limitation of naive LSB.
- ❌ Social media re-compression: WeChat / Twitter / Instagram / iMessage re-encode PNGs as JPEG or downscale them — this destroys the payload.
- ❌ Screenshots or re-saves: Right-click-save is lossless; screenshots, in-app screen grabs, and compressed messengers destroy the data.
Recommendation: always encrypt for sensitive content, and share via direct file transfer (email attachment, direct download link, USB).
Free online image steganography tool — hide secret messages inside images. Runs in your browser with LSB (least-significant-bit) encoding, optional AES-GCM-256 encryption via WebCrypto API (PBKDF2-SHA-256, 100,000 iterations) and optional gzip compression. Output is always lossless PNG. Live capacity meter, automatic round-trip self-verify after embedding, extract distinguishes three error states clearly: no-payload / wrong-password / corrupted. Accepts JPEG / PNG / WebP / BMP covers (JPEG triggers warning, alpha auto-flattened to white). Four upload paths (drag / paste / gallery / camera), bilingual zh/en, 44px mobile touch targets, iOS Safari 16MP canvas guard. Images and passwords are not uploaded by the tool.