Top 15 iSteg Alternative and Similar Softwares | Apr 2024

iSteg is an encryption tool used to hide a file (for example a zip archive) inside a jpeg picture. This encryption technology is called steganography. iSteg is a frontend for the opensource tool outguess 2.0. iSteg can be used to both encode and decode a hidden file.

1. east-tec InvisibleSecrets

east-tec InvisibleSecrets east-tec InvisibleSecrets not only encrypts your data and files for safe keeping or for secure transfer across the net, it also hides them in places that on the surface appear totally innocent, such as picture or sound files, or web pages. These types of files are a perfect disguise for......

2. Camouflage

Camouflage Camouflage v1.2.1 - final version. Camouflage allows you to hide files by scrambling them and then attaching them to the file of your choice. This camouflaged file then looks and behaves like a normal file, and can be stored, used or emailed without attracting attention.For example, you could create a......

3. Secret Layer

Secret Layer Secret Layer lets you encrypt your data and then hide that encrypted data in ordinary images, like the ones used every day on all websites and email attachments. Secret Layer very slightly tweaks the color of specific pixels. You can't distinguish the altered photo from the original one. Any time......

4. Safeplicity

Safeplicity Do you have sensitive files you would like to password-protect but don’t know how? With Safeplicity, you can password-protect AND encrypt all your confidential files in just a few clicks, without any IT skills whatsoever. To protect a folder, you simply right-click on it, choose “Protect with Password” and choose......

5. Hider

Hider Your data. Protected.Hider 2 is the Fort Knox of digital storage. Anything and everything you hide with Hider 2 is tightly locked up and hidden, making it ultra-secure.Everything in its place.Organization is key when it comes to hiding and keeping track of files. Hider 2 helps you sort out your......

6. CipherShed

CipherShed A fork of the now-discontinued TrueCrypt . CipherShed is a program that can be used to create encrypted files or encrypt entire drives (including USB flash drives and external HDDs). There’s no complicated commands or knowledge required; a simple wizard guides you step-by-step through every process.After creating an encrypted......

7. east-tec SafeBit

east-tec SafeBit east-tec SafeBit is the perfect electronic vault you need for your privacy. It features on-the-fly AES encryption, by creating virtual encrypted disk drives, where you can hide files and folders, keep them encrypted all the time, but still work with them just like you work with normal files. Data is......

8. eCryptfs

eCryptfs The enterprise cryptographic filesystem for Linux......

9. United States Air Force Research Lab Encryption Wizard

United States Air Force Research Lab Encryption Wizard Encryption Wizard (EW) is a simple, strong, Java file and folder encryptor for protection of sensitive information. EW encrypts all file types for data-in-transit protection and supplements data-at-rest protection. Without requiring installation or elevated privileges, EW runs on Windows, Mac, Linux, Solaris, and any other computers with Standard Edition Java.......

10. Jetico BestCrypt

Jetico BestCrypt If your computer were ever to be stolen, are you certain that your personal information cannot be discovered? Jetico’s BestCrypt software automatically encrypts your files so that nobody can read the data unless they have the right password or keys.BestCrypt supports several encryption algorithms and security standards and offers multiple......

11. Steghide

Steghide Steghide is a steganography program that is able to hide data in various kinds of image- and audio-files. The color- respectivly sample-frequencies are not changed thus making the embedding resistant against first-order statistical tests.Features: compression of embedded dataencryption of embedded dataembedding of a checksum to verify the integrity of the......

12. OnionMail

OnionMail OnionMail is an anonymous and encrypted mail server designed to run on the TOR network without losing the ability to communicate with the Internet. This ensures greater privacy to the users but also protect against eavesdropping of the NSA and others.......

13. Outguess

Outguess Outguess is an advanced steganography tool. Outguess will hide your file inside the picture of your choice in easy steps :To hide a file within an image :- Select your image (container) and a file to hide (content). - Write a key in the preferences (used to hide data).- Click......

14. CryFS

CryFS CryFS encrypts your files, so you can safely store them anywhere. It works well together with cloud services like Dropbox, iCloud, OneDrive and others. The goal of CryFS is not only to keep file contents, but also file sizes, metadata and directory structure confidential.......

15. Privacy Optimizer

Privacy Optimizer This powerful tool suite will allow you to change your System default privacy settings, and allows you to easily and quickly hide your IP via the integrated proxy manager. Privacy Optimizer also includes a free privacy optimized web browser that more readily fulfills the need to be anonymous in both......