Hide data inside images.

Encrypt your message, then embed it in a normal-looking photo. No encrypted file on your drive. Just a picture of your cat.


1

Choose a cover image

Drop a PNG, JPEG, or WebP image here
2

Secret message

3

Password

You'll download a PNG image with your secret hidden inside. The image will look identical to your original.
1

Image containing hidden data

Drop the PNG image containing hidden data
2

Password


How steganography works.

Your message is encrypted with AES-256, then each bit is stored in the least significant bit of the image's pixel data. The visual difference is invisible to the human eye. The output is a normal PNG file that opens in any image viewer.

Combined with deny.sh's deniable encryption, you get two layers of protection: the encrypted data is hidden inside the image (steganography), and if discovered, it decrypts to a decoy (deniability).

Tip: a 1000x1000 PNG can hold about 366KB of hidden data. A 12-word seed phrase is about 100 bytes. Plenty of room.


Everything runs in your browser.

No server uploads. No API calls. Your image and message never leave your machine.

Need to do this at scale? The steganography API does the same thing server-side, with batch processing and webhook notifications.


FAQ.

Can someone tell the image has hidden data?

Not visually. The changes are in the least significant bits of pixel data, invisible to the human eye. Statistical analysis (chi-square, RS analysis) can detect steganography in some cases, but combined with deny.sh's encryption the hidden data is indistinguishable from noise.

What image formats are supported?

Input: PNG, JPEG, or WebP. Output is always PNG (lossless), because lossy compression (JPEG) destroys the hidden data. If you upload a JPEG, it's converted to PNG before embedding.

How much data can I hide?

Roughly 3 bits per pixel. A 1000x1000 image holds about 366KB. A 12-word seed phrase is under 100 bytes, so even a small image has plenty of capacity. The tool shows available capacity before you embed.

Will social media compress away the hidden data?

Yes. Platforms like Instagram, WhatsApp, and Twitter re-compress images, which destroys the steganographic payload. Store and share the original PNG file directly (email, cloud drive, USB). Don't rely on social media as a delivery mechanism.