please wait
 
close window
top menu - tab edge
Home      members Customer Portal     corporate Corporate     partners Partners     contact us Contact Us
Partners
Testimonials
Reseller Application
Map and Directions
FAQ - Stego Suite™

  1. What do I get with Stego Suite?
  2. Do criminals and terrorists actually use steganography to communicate or hide information?
  3. What type of digital carrier files might contain steganography or hidden messages?
  4. Why would someone use steganography to hide information when encryption programs are available that do that same thing?
  5. What types of steganography can Stego Suite detect?
  6. How do I get updates after I buy the software?
  7. What if I find an image that I believe contains steganography? What's next?
  8. Do you offer training on steganography investigation?
  9. Can Stego Suite detect the presence of steganography in any image 100% of the time?

What do I get with Stego Suite?
When you purchase Stego Suite, you will receive an installation CD, an HPV required for use, and all user manuals and documentation on the installation CD.

Do criminals and terrorists actually use steganography to communicate or hide information?
Yes, there have been many reported incidents where steganography has and is being used. Today, over 470 different steganography programs exist for free and are anonymously downloaded from the Internet.

What type of digital carrier files might contain steganography or hidden messages?
The most popular type of carrier file today are digital images (jpeg, gif, bmp, etc.). However, programs exist that will hide data in digital audio and digital video files as well. In addition, some programs can hide information in text files, html web pages, and executable files.

Why would someone use steganography to hide information when encryption programs are available that do that same thing?
Well, actually there is one very important difference between steganography and encryption. The purpose of encryption is to scramble information so that only those that hold the keys can recover the data. On the contrary, the purpose of steganography is to hide the mere existence of hidden information. This is what makes steganography more sinister than encryption.

What types of steganography can Stego Suite detect?
Today we supply algorithms that process the most common image types. They include paletted images such as bmp, gif, and png, and true color images like 24-bit BMP files and lossy compressed images such as JPG. In addition, we have detectors that analyze audio wav file embedding as well.

How do I get updates after I buy the software?
If you have a current maintenance contract, you will receive software updates when they become available. Updates will be mailed to the address that we have on file.

What if I find an image that I believe contains steganography? What's next?
After running the steganography detection algorithms against the suspect image, our software provides two additional steps. Stego Analyst allows you to examine image or audio files for "artifacts" that are typically caused by the insertion of information into digital images or audio files. Once you determine that there is a high degree of suspicion that steganography exists, breaking or cracking the steganography may be possible. Our software currently can attack the most popular types of steganography programs. The Stego Break product within the suite provides these capabilities.

Do you offer training on steganography investigation?
Yes, WetStone offers a two-day intensive training course that provides in-depth training on the the process of investigating steganography. The course is 8 hours of lecture with 6 hours of hands on laboratory exercises.

Can Stego Suite detect the presence of steganography in any image 100% of the time?
Absolutely NOT! Nobody can. The art of steganography has been around for over 2500 years, and the ability of our adversaries to conceal information and covertly communicate is a key element in modern and medieval warfare. We continue to improve our detection, analysis, and cracking capabilities to counter these threats.