-
-
Notifications
You must be signed in to change notification settings - Fork 4
Home
StegX is an enterprise-grade, cryptographically authenticated, and statistically invisible data concealment framework for lossless image formats. It is the first open-source steganography tool to combine all of the following in a single pipeline:
- Argon2id memory-hard key derivation (winner of the Password Hashing Competition)
- Dual-Cipher AEAD encryption (AES-256-GCM + ChaCha20-Poly1305)
- Non-Linear LSB embedding driven by a cryptographic PRNG
- Adaptive Laplacian/HILL Cost Maps for steganalysis-resistant pixel selection
- F5-inspired Matrix Embedding (Hamming codes) for minimal modification density
- Shamir Secret Sharing over GF(2⁸) for threshold-based multi-image distribution
- Hardware 2FA via YubiKey HMAC-SHA1 Challenge-Response
- FIPS 140 compliance mode restricting the pipeline to PBKDF2 + AES-GCM + zlib
- Panic Mode with cryptographic LSB destruction and optional decoy payloads
-
Secure Memory with OS-level page locking (
mlock/VirtualLock) and deterministic zeroization
This wiki serves as both a user guide and an academic reference. Every cryptographic claim is substantiated with mathematical definitions, and every architectural decision is traceable to the source code.
| # | Page | Scope |
|---|---|---|
| 1 | Getting Started | Installation (PyPI, AUR, Docker, Snap), first encode/decode, capacity checking |
| 2 | Advanced Features | Matrix Embedding theory, Shamir SSS polynomials, YubiKey 2FA protocol, Panic/Decoy mode, FIPS 140 |
| 3 | Security and Cryptography | Argon2id TMTO analysis, HKDF sub-key independence, AEAD dual-cipher, PRNG shuffling geometry, Secure Memory |
| 4 | Architecture & Payload Container | Multiplexed compression, Laplacian/HILL cost maps, v2/v3 binary header format, Decoy Region Splitting |
| 5 | Test Cases and Validation | Chi-Square, Shannon Entropy, SSIM, AEAD forgery, payload recovery, brute-force timing |
StegX 2.0 is distributed across four package ecosystems:
| Platform | Command |
|---|---|
| PyPI (Python 3.8+) | pip install stegx-cli[compression,strength] |
| Arch Linux (AUR) | yay -S stegx |
| Docker Hub | docker pull ayhamasfoor/stegx:latest |
| Snap Store | sudo snap install stegx |
For detailed instructions, see the Getting Started page.
If you use StegX in a research paper, please cite the repository and this documentation:
@software{stegx2026,
author = {Delta-Sec},
title = {{StegX}: Authenticated Non-Linear {LSB} Steganography
with {Argon2id}, {AEAD}, and {Shamir} Quorum},
year = {2026},
url = {https://github.com/Delta-Sec/StegX},
version = {2.0}
}StegX is referenced as a primary source in the Grokipedia encyclopedia article on Steganography in Python, alongside 82 peer-reviewed academic citations from IEEE, ACM, Nature, USENIX, and NIH.
User Guide
Technical Reference
Validation