Local steganography

OzStegano

Hide text or files inside PNG images locally in your browser, with optional AES encryption before embedding.

Local only All local features free PNG LSB now WAV planned
Local-only note

Carrier files and hidden data are processed locally in your browser. OzStegano does not upload your files.

All local/offline OzStegano features are free. Future paid features, if any, would only apply to online services that require backend infrastructure.

Hide data

Embed text or a file into a PNG carrier

OzStegano embeds an OZS1 payload into PNG pixel data. The carrier still opens as a normal PNG image.

Carrier

Choose a PNG carrier

PNG is lossless, which is why it can preserve hidden bits. JPEG and other lossy formats are intentionally rejected.

Payload

Choose hidden text or a file

Text uses a local UTF-8 payload. File mode preserves the file bytes and restores the original filename and MIME type on extract.

Advanced local options

Choose how the payload is embedded

Everything here is local-only and free. Planned items are shown honestly and are not active in this build.

Random padding Local planned feature
Pseudo-random embedding Local planned feature
ZIP before hiding Local planned feature
WAV LSB for PCM WAV Local planned feature
Password warning

If you lose the password, OzStegano cannot recover the hidden data.

Result

Stego output

Download the stego PNG after embedding. Recompressing or editing the image later may destroy the hidden data.

Extract data

Read hidden payload data from a PNG

OzStegano looks for an embedded OZS1 payload. If the payload is encrypted, enter the password to restore it.

Stego file

Choose a PNG to inspect

Only PNG extraction is active in this build. Lossy formats such as JPEG or MP3 are intentionally unsupported.

Embedded payload

Detected hidden payload

Preview metadata before download. Text payloads can be copied directly after extraction.

Restored output

Extracted text or file

Checksum verification runs locally after extraction. If the payload was encrypted, verification happens after decryption.

Guide

Use steganography carefully

Steganography hides content inside a carrier file, but it is not magic. Treat it as a concealment layer, and add encryption when the content matters.

Supported carrier formats

  • PNG works because it is lossless and preserves the embedded least-significant bits.
  • WAV support is planned for local PCM audio carriers, but it is not active in this build.
  • JPEG, WebP, GIF, MP3, AAC, OGG, and other lossy formats may destroy hidden data.

Operational safety

  • Do not edit, recompress, crop, or screenshot the stego PNG after hiding data.
  • Steganography can still be detected by forensic tools. Hiding is not the same as being undetectable.
  • AES encryption protects the hidden content, but it does not make the embedding itself invisible.
Review before sharing

Open the generated PNG locally, confirm the image still looks acceptable, and test extraction before you rely on it.