What you see isn't everything.
This image contains hidden data.
numpy, pillow, click, ...
Check pyproject.toml
pip install -r web/requirements.txt
converts the input string to binary and replaces the LSB of each pixel
# case 1. use default setting
python examples/hide.py
# case 2. input options
python examples/hide.py -in image.png -out output.png -m message.txt
# case 3. binjector from pypi
binjector hide -i image.png -o output.png -m message.txt
Concatenate each LSB in the image to see the hidden string.
# case 1. use default setting
python examples/seek.py
# case 2. input options
python examples/seek.py -in output.png
# case 3. binjector from pypi
binjector seek -i output.png
can serve steganography module on web server if you want.
uvicorn web.server.main:app --host=0.0.0.0 --port=8000
can serve steganography webpage if you want
cd web/client && yarn && yarn dev
Check this out
You can check the image path or other required values.
{
"encoding": "utf8",
"bits": 8,
"token_string": "#secret#",
"message": "./message.txt",
"in_image": "./image.png",
"out_image": "./output.png",
"modified_image": "./output.png"
}