CacheHackCacheHack

Steganography Detector

Detect hidden messages in text using various steganographic techniques. Extract acrostics, hidden patterns, and embedded data.

Paste suspicious text to check for hidden messages

Common Steganography Techniques

Text-based

  • • Acrostics (first letters)
  • • Null ciphers (nth letters)
  • • Capital letter messages
  • • Zero-width characters

Image-based

  • • LSB (Least Significant Bit)
  • • Hidden in metadata
  • • Color channel manipulation
  • • Appended file data

What is Steganography?

Steganography is the practice of hiding secret information within ordinary, non-secret data or physical objects. Unlike cryptography (which makes data unreadable), steganography conceals the very existence of the message.

Text Steganography Methods

Acrostics

The first letter of each word or line spells out a hidden message. This is one of the oldest and most common text steganography techniques.

Null Ciphers

Hidden messages extracted by taking every Nth letter, word, or other pattern from the cover text.

Format-Based Hiding

  • Whitespace: Using spaces, tabs, or zero-width characters
  • Capitalization: Strategic use of capitals to encode data
  • Punctuation: Hidden meaning in punctuation patterns

Image Steganography

LSB (Least Significant Bit)

The most common digital steganography technique. It replaces the least significant bits of pixel color values with message data. The changes are invisible to the human eye.

Metadata Hiding

Information can be hidden in image metadata (EXIF data) or appended to file structures without affecting the visible image.

Steganography in Geocaching

Steganography is popular in geocaching puzzles because:

  • Hidden in plain sight: Messages in innocent-looking text
  • Image puzzles: Coordinates hidden in cache page images
  • Multiple layers: Can combine with encryption for harder puzzles
  • Creative hiding: Many possible techniques to discover

Detection Tips

  1. Read carefully: Does the text seem oddly worded?
  2. Check first letters: Look for acrostics
  3. Examine formatting: Unusual spacing or capitalization?
  4. Analyze images: Use specialized tools for LSB analysis
  5. Check metadata: Use exiftool on images

External Analysis Tools

For image steganography, specialized tools are needed:

  • Aperi'Solve: Online all-in-one stego analyzer
  • StegOnline: Browser-based LSB tools
  • zsteg: Command-line PNG/BMP analyzer
  • steghide: Extract from JPEG files
  • binwalk: Find embedded files