Choose a PNG carrier
PNG is lossless, which is why it can preserve hidden bits. JPEG and other lossy formats are intentionally rejected.
Hide text or files inside PNG images locally in your browser, with optional AES encryption before embedding.
Carrier files and hidden data are processed locally in your browser. OzStegano does not upload your files.
All local/offline OzStegano features are free. Future paid features, if any, would only apply to online services that require backend infrastructure.
OzStegano embeds an OZS1 payload into PNG pixel data. The carrier still opens as a normal PNG image.
PNG is lossless, which is why it can preserve hidden bits. JPEG and other lossy formats are intentionally rejected.
Text uses a local UTF-8 payload. File mode preserves the file bytes and restores the original filename and MIME type on extract.
Everything here is local-only and free. Planned items are shown honestly and are not active in this build.
If you lose the password, OzStegano cannot recover the hidden data.
Download the stego PNG after embedding. Recompressing or editing the image later may destroy the hidden data.
OzStegano looks for an embedded OZS1 payload. If the payload is encrypted, enter the password to restore it.
Only PNG extraction is active in this build. Lossy formats such as JPEG or MP3 are intentionally unsupported.
Preview metadata before download. Text payloads can be copied directly after extraction.
Checksum verification runs locally after extraction. If the payload was encrypted, verification happens after decryption.
Steganography hides content inside a carrier file, but it is not magic. Treat it as a concealment layer, and add encryption when the content matters.
Open the generated PNG locally, confirm the image still looks acceptable, and test extraction before you rely on it.