Skip to main content
TechRadar TechRadar the technology experts
Asia
flag of Singapore
Singapore
Europe
flag of Danmark
Danmark
flag of Suomi
Suomi
flag of Norge
Norge
flag of Sverige
Sverige
flag of UK
UK
flag of Italia
Italia
flag of Nederland
Nederland
flag of België (Nederlands)
België (Nederlands)
flag of France
France
flag of Deutschland
Deutschland
flag of España
España
North America
flag of US (English)
US (English)
flag of Canada
Canada
flag of México
México
Australasia
flag of Australia
Australia
flag of New Zealand
New Zealand
RSS
Sign in
  • View Profile
  • Sign out
  • Phones
      • iPhone
      • Samsung Galaxy
      • Google Pixel
      • Nothing
      • Motorola
      • OnePlus
      • Xiaomi
      • Honor
      • Oppo
      • Huawei
      • Android
      • iOS
      • Network Carriers
      • Phone Accessories
      • Phone Reviews
      • Phone Buying Guides
      • Phone Deals
      • Phone News
  • Computing
    • Laptops
      • Chromebooks
      • MacBooks
      • Windows Laptops
      • Gaming Laptops
      • Desktop PCs
      • Macs
      • Gaming PCs
    • Software
      • Windows
      • macOS
    • Components
      • CPUs
      • GPUs
      • Storage
      • Nvidia
      • Intel
    • Internet
      • Websites & Apps
      • Wi-Fi & Broadband
      • Social Media
      • Wordle
    • Security
      • Antivirus
      • Cyber Security
    • Tablets
      • eReaders
      • iPad
    • VR & AR
    • Peripherals
      • Monitors
      • Keyboards
      • Webcams
      • Mice
      • Dell
      • HP
      • Lenovo
      • Acer
      • Computing Reviews
      • Computing Buying Guides
      • Computing Deals
      • Computing News
  • AI
    • AI Platforms & Assistants
    • OpenAI
    • ChatGPT
    • Gemini
    • Apple Intelligence
    • Claude
  • TVs
      • TV Reviews
      • TV Buying Guides
      • TV Deals
      • TV News
      • Home Theatre
      • Soundbars
      • Streaming Devices
      • Projectors
      • Blu-ray
  • Streaming
    • Entertainment
    • Netflix
    • Prime Video
    • Disney+
    • Apple TV+
    • HBO Max
    • Hulu
    • Paramount+
    • How to Watch
  • Fitness
      • Smartwatches
      • Fitness Trackers
      • Exercise Equipment
      • Fitness Headphones
      • Fitness Apps
      • Smart Rings
      • Apple Watch
      • Fitbit
      • Garmin
      • Google Pixel Watch
      • Samsung Galaxy Watch
      • Sleep
      • Oral Health
      • Fitness News
      • Fitness Reviews
      • Fitness Buying Guides
      • Fitness Deals
  • Audio
    • Headphones
      • Earbuds & AirPods
      • Wireless Headphones
    • Speakers
      • Wireless Speakers
      • Sonos
    • Hi-Fi
      • Turntables
      • Portable Players
      • DACs
    • Audio Streaming
      • Spotify
      • Apple Music
      • Audio News
      • Audio Reviews
      • Audio Buying Guides
      • Audio Deals
  • VPN
    • VPN Services
    • VPN Security
    • ExpressVPN
    • NordVPN
  • Cameras
      • Mirrorless
      • DSLRs
      • Compact
      • Action
      • Video
      • Drones
      • 360 Cameras
      • Dash Cams
      • Canon
      • DJI
      • Fujifilm
      • Nikon
      • GoPro
      • Insta360
      • Camera Accessories
      • Camera Lenses
      • Camera Reviews
      • Camera Buying Guides
      • Camera Deals
      • Camera News
      • Photography
  • Home
    • Smart Home
      • Home Security
      • Smart Speakers
      • Smart Lights
      • Smart Scales
      • Smart Thermostats
      • Amazon Echo
    • Small Appliances
      • Air Fryers
      • Air Quality
      • Coffee Machines
      • Hair Care
      • Vacuums
      • Robot Vacuums
      • Dyson
      • Philips Hue
      • Ring
      • Shark
      • Ninja
      • Home Reviews
      • Home Buying Guides
      • Home Deals
      • Home News
  • EVs
  • Browse
      • News
      • Best
      • Reviews
      • Deals
      • Versus
      • How To
      • Opinion
      • Coupons
      • Samsung
      • Sony
      • Microsoft
      • Apple
Tech Radar Pro Tech Radar Gaming
  • Phones
    • View Phones
      • iPhone
      • Samsung Galaxy
      • Google Pixel
      • Nothing
      • Motorola
      • OnePlus
      • Xiaomi
      • Honor
      • Oppo
      • Huawei
      • Android
      • iOS
      • Network Carriers
      • Phone Accessories
      • Phone Reviews
      • Phone Buying Guides
      • Phone Deals
      • Phone News
  • Computing
    • View Computing
    • Laptops
      • View Laptops
      • Chromebooks
      • MacBooks
      • Windows Laptops
      • Gaming Laptops
      • Desktop PCs
      • Macs
      • Gaming PCs
    • Software
      • View Software
      • Windows
      • macOS
    • Components
      • View Components
      • CPUs
      • GPUs
      • Storage
      • Nvidia
      • Intel
    • Internet
      • View Internet
      • Websites & Apps
      • Wi-Fi & Broadband
      • Social Media
      • Wordle
    • Security
      • View Security
      • Antivirus
      • Cyber Security
    • Tablets
      • View Tablets
      • eReaders
      • iPad
    • VR & AR
    • Peripherals
      • View Peripherals
      • Monitors
      • Keyboards
      • Webcams
      • Mice
      • Dell
      • HP
      • Lenovo
      • Acer
      • Computing Reviews
      • Computing Buying Guides
      • Computing Deals
      • Computing News
  • AI
    • View AI
    • AI Platforms & Assistants
    • OpenAI
    • ChatGPT
    • Gemini
    • Apple Intelligence
    • Claude
  • TVs
    • View TVs
      • TV Reviews
      • TV Buying Guides
      • TV Deals
      • TV News
      • Home Theatre
      • Soundbars
      • Streaming Devices
      • Projectors
      • Blu-ray
  • Streaming
    • View Streaming
    • Entertainment
    • Netflix
    • Prime Video
    • Disney+
    • Apple TV+
    • HBO Max
    • Hulu
    • Paramount+
    • How to Watch
  • Fitness
    • View Fitness
      • Smartwatches
      • Fitness Trackers
      • Exercise Equipment
      • Fitness Headphones
      • Fitness Apps
      • Smart Rings
      • Apple Watch
      • Fitbit
      • Garmin
      • Google Pixel Watch
      • Samsung Galaxy Watch
      • Sleep
      • Oral Health
      • Fitness News
      • Fitness Reviews
      • Fitness Buying Guides
      • Fitness Deals
  • Audio
    • View Audio
    • Headphones
      • View Headphones
      • Earbuds & AirPods
      • Wireless Headphones
    • Speakers
      • View Speakers
      • Wireless Speakers
      • Sonos
    • Hi-Fi
      • View Hi-Fi
      • Turntables
      • Portable Players
      • DACs
    • Audio Streaming
      • View Audio Streaming
      • Spotify
      • Apple Music
      • Audio News
      • Audio Reviews
      • Audio Buying Guides
      • Audio Deals
  • VPN
    • View VPN
    • VPN Services
    • VPN Security
    • ExpressVPN
    • NordVPN
  • Cameras
    • View Cameras
      • Mirrorless
      • DSLRs
      • Compact
      • Action
      • Video
      • Drones
      • 360 Cameras
      • Dash Cams
      • Canon
      • DJI
      • Fujifilm
      • Nikon
      • GoPro
      • Insta360
      • Camera Accessories
      • Camera Lenses
      • Camera Reviews
      • Camera Buying Guides
      • Camera Deals
      • Camera News
      • Photography
  • Home
    • View Home
    • Smart Home
      • View Smart Home
      • Home Security
      • Smart Speakers
      • Smart Lights
      • Smart Scales
      • Smart Thermostats
      • Amazon Echo
    • Small Appliances
      • View Small Appliances
      • Air Fryers
      • Air Quality
      • Coffee Machines
      • Hair Care
      • Vacuums
      • Robot Vacuums
      • Dyson
      • Philips Hue
      • Ring
      • Shark
      • Ninja
      • Home Reviews
      • Home Buying Guides
      • Home Deals
      • Home News
  • EVs
  • Browse
    • View Browse
      • News
      • Best
      • Reviews
      • Deals
      • Versus
      • How To
      • Opinion
      • Coupons
      • Samsung
      • Sony
      • Microsoft
      • Apple
Tech Radar Pro Tech Radar Gaming
Trending
  • Best VPN
  • Back to school
  • Best laptop
  • ChatGPT
  • Nintendo Switch 2
  • NYT Wordle today
  • Best web hosting
Don't miss these
Hacker with malware code in computer screen. Cybersecurity, privacy or cyber attack. Programmer or fraud criminal writing virus software. Online firewall and privacy crime. Web data engineer
Security AI chatbot users beware - hackers are now hiding malware in the images served up by LLMs
Security
Security This surprisingly simple way to hide hardware security keys in mainstream flash memory could pave the way for ultra-secure storage very soon
Bitcoin
Security A bizarre new Linux malware can be found hiding in cute animal photos
A hacker typing on a MacBook laptop with code on the screen.
Security Docker could still be hosting a whole load of potentially malicious images - putting users at risk
Transfer data to a server or hosting service.Data transfer concept. FTP(File Transfer Protocol).
Security Best ways to share files securely of 2025
Cybersecurity ensures data protection on internet. Data encryption, firewall, encrypted network, VPN, secure access and authentication defend against malware, hacking, cyber crime and digital threat
Security Dangerous new Linux malware strikes - thousands of users see passwords, personal info stolen, here's what we know
Android Logo
Security This dangerous new Android malware looks to hide from detection with distorted APKs
Banking
Security Criminals are targeting hundreds of legitimate banking & crypto apps using an advanced virtualization technique — here's how to stay safe
Futuristic cyber cat in cyberpunk style
Security This dangerous new malware is hitting iOS and Android phones alike - and it's even stealing photos and crypto
A laptop showing lots of email notifications
Security How to send an anonymous email
Caution sign data unlocking hackers. Malicious software, virus and cybercrime, System warning hacked alert, cyberattack on online network, data breach, risk of website
Security Hackers could one day use novel visual techniques to manipulate what AI sees - RisingAttacK impacts 'most widely used AI computer vision systems'
Phishing, E-Mail, Network Security, Computer Hacker, Cloud Computing Cyber Security 3d Illustration
Security These scientists have a unique way of tackling video deepfakes - and all it takes is a burst of light
Shocked woman worker looking at laptop screen
Security Watch where you click - adult sites are hiding clickjacking malware in images, and all for Facebook likes
Security This devious cyberattack uses smartwatches to pinch data from air-gapped systems
Representational image of a cybercriminal
Security Hackers are distributing a fake PDF Editor loaded with TamperedChef credential stealing malware
  1. Computing
  2. Computing Security

How to hide files in images using OpenStego

How-to
By Nate Drake published 18 September 2017

When you purchase through links on our site, we may earn an affiliate commission. Here’s how it works.

Digital steganography is the technique of hiding one file inside another. If, for instance, you have a buried chest of treasure, you can store the coordinates inside a harmless looking picture. To the naked eye, the file would seem to be an image like any other, but you and those you trust can extract the secret data with specialist tools.

OpenStego is one such tool. This handy free and open source app can be used to take any files you want and keep them secret by disguising them as random digital ‘noise’ inside a larger one.

In this guide, you’ll learn how to download and run OpenStego, as well as the basics of hiding your very first, password-protected, message.

Page 1 of 11
Page 1 of 11
1. Download OpenStego

1. Download OpenStego

Open your browser and navigate to the OpenStego website. Click 'Downloads' at the top right. Scroll down to find the right version of OpenStego for your processor e.g. 'Setup-OpenStego-0.7.1.exe'. 

Click on the file and choose 'Run'. Windows 10 will ask you to confirm you want to let the app make changes. Click 'Yes'. 

OpenStego setup will now launch. Click 'I Agree' on the License Agreement page, check the destination folder, then click 'Install'. Once you see the screen reading 'Installation Complete', click 'Close' at the bottom right. Do not run OpenStego for now.

Page 2 of 11
Page 2 of 11
2. Install Java Runtime Environment

2. Install Java Runtime Environment

OpenStego is written in Java so you must install the JRE (Java Runtime Environment) to load it. Click on the offline installer for your processor architecture e.g. Windows x64 Offline. Choose ‘Run’ once again and click ‘Yes' to allow the JRE to make changes to your computer.

Java Setup will now start. Click ‘Install’ to begin, then ‘Close’.

Click the Start Menu and select ‘Run OpenStego’ in the ‘Recently Added’ section. Windows 10 may start searching for 'javaw.exe'. If so, give it a few minutes to complete then choose to 'Fix' the broken link. OpenStego will now launch.

Page 3 of 11
Page 3 of 11
3. Create your message file

3. Create your message file

Before using OpenStego, you need to create the secret file you want to remain hidden. There's no restriction on the format of 'message' files – this can be a text document or another image, however it has to be smaller than the cover file it hides inside. 

If your file is very large, OpenStego supports splitting it across a number of cover files. However, it's probably easier to encrypt and upload it to a website, then create a text file detailing the URL and password.

See our guide on Encryption Tools for more information. 

The example message file above is a QR code containing GPS coordinates of buried treasure.

Page 4 of 11
Page 4 of 11
4. Choose your cover file

4. Choose your cover file

The cover file should be a harmless looking image, inside which the 'message' file will be stored. Give some careful thought to the image you choose. In the first instance, make sure it's bigger than the 'message' file.

Try to use a picture you've taken yourself. Otherwise, someone could compare the file you produce with OpenStego to the original and work out where data is hidden. 

Make sure there are plenty of photos on your computer and that you have a plausible reason for having this one on your hard drive. For instance, if you have an interest in photography or history, you could use a picture of a vintage camera.

Page 5 of 11
Page 5 of 11
5. Configure the file settings

5. Configure the file settings

Once you've chosen your 'message' and 'cover' files, return to OpenStego. Click the button besides ‘Message File’ and select the file you wish to hide.

Next, click the button inside the ‘Cover File’ box. Navigate to the harmless cover file you chose earlier. Click ‘Open’ to confirm.

Finally, click the button inside the ‘Output Stego File’ box. Navigate to the folder where you want to store the output stego file e.g. Desktop, then enter a name for it in the box below e.g. camera1. Click ‘Open’ once again.

Page 6 of 11
Page 6 of 11
6. Choose encryption settings

6. Choose encryption settings

Head down to the ‘Options’ box. From here you can choose to encrypt your message file with a password before hiding it inside the cover file. Without the correct password, the data will be irretrievable. 

If you wish to do this, click on the ‘Encryption Algorithm’ box first. From here you can choose how to protect your data. The default setting (AES128) is perfectly secure, however you can increase the encryption strength to AES 256 if you wish. (This may slow down the extraction process slightly).

DES is no longer secure, so do not choose it.

Enter your password in the 'Password' field, then again under 'Confirm Password'. 

Page 7 of 11
Page 7 of 11
7. Hide your data

7. Hide your data

Click the ‘Hide Data’ button at the bottom-right of the screen to begin the process of concealing your message file inside the cover file. OpenStego will state it's processing the file, then display a message saying that the message has been embedded. Click ‘OK’. 

Next, make sure to erase the original 'message' and 'cover' file securely. This way there'll be no way to retrieve your secret file without using OpenStego and the password if you set one.

Remember that if a malicious user finds OpenStego installed on your Windows PC, they may realise you have hidden files. 

Page 8 of 11
Page 8 of 11
8. Test extracting files

8. Test extracting files

If you want to test if OpenStego hid the file properly, click the ‘Extract Data’ button at the top left of the window. 

Click the button besides ‘Input Stego File’ and find the stego file you created earlier e.g. camera1.png. Next, click the button in the box marked ‘Output folder for Message file’ to choose where to extract the 'message' file.

If you set a password earlier, make sure to type this into the password field. Finally click ‘Extract Data’. If successful, you'll see a notification saying the 'message' file has been extracted.

Page 9 of 11
Page 9 of 11
9. Generate signature to watermark files

9. Generate signature to watermark files

The downside of using steganography is there's no automatic way to stop someone from replacing your secret file with another. OpenStego tries to prevent this by using digital watermarking. 

You can do this through generating a signature using a passphrase, which you can then embed as a watermark into your secret file. 

To get started, click ‘Generate’ signature on the left hand side and type in any passphrase in the box marked ‘Passphrase to be used to Generate Signature’. 

Click the button in the box marked ‘Output Signature File’. Navigate to the location where you wish to store the signature file and type a name in the field at the bottom.

Click ‘Generate Signature’ to create the signature file.

Page 10 of 11
Page 10 of 11
10. Embed the watermark using your signature

10. Embed the watermark using your signature

To embed the signature in a message file, click ‘Embed Watermark’ on the left of the window.

Click the button beside ‘File to be Watermarked’ and choose the message file you want to watermark.

Do the same for the box marked ‘Signature File’ and choose the one you just created.

Finally click the button besides ‘Output Watermarked File’ and choose a location and name for the new message file. Click ‘Embed Watermark’ to continue.

If anyone wishes to verify your signature using OpenStego, make sure they have a copy of your signature file then ask them to click ‘Verify Watermark’. From there they can choose to compare the watermarked image to your signature. 

  • Here's how to securely destroy data
Page 11 of 11
Page 11 of 11
Nate Drake

Nate Drake is a tech journalist specializing in cybersecurity and retro tech. He broke out from his cubicle at Apple 6 years ago and now spends his days sipping Earl Grey tea & writing elegant copy.

See more Computing How Tos
Read more
Hacker with malware code in computer screen. Cybersecurity, privacy or cyber attack. Programmer or fraud criminal writing virus software. Online firewall and privacy crime. Web data engineer
AI chatbot users beware - hackers are now hiding malware in the images served up by LLMs
Security
This surprisingly simple way to hide hardware security keys in mainstream flash memory could pave the way for ultra-secure storage very soon
Bitcoin
A bizarre new Linux malware can be found hiding in cute animal photos
A hacker typing on a MacBook laptop with code on the screen.
Docker could still be hosting a whole load of potentially malicious images - putting users at risk
Transfer data to a server or hosting service.Data transfer concept. FTP(File Transfer Protocol).
Best ways to share files securely of 2025
Cybersecurity ensures data protection on internet. Data encryption, firewall, encrypted network, VPN, secure access and authentication defend against malware, hacking, cyber crime and digital threat
Dangerous new Linux malware strikes - thousands of users see passwords, personal info stolen, here's what we know
Latest in Computing Security
European Union technical background
Chat Control: The list of countries opposing the law grows, but support remains strong
US President Donald Trump on the left, EU flag on a binary code on the right
EU rejects claims of censorship targeting US tech giants – but Trump threatens sanctions
Andrew Ferguson, chair of the Federal Trade Commission (FTC), during a Bloomberg Television interview in Washington, DC, US, on Friday, Aug. 22, 2025.
FTC calls on big tech to resist UK and EU demands to weaken encryption and censor content
Apple Logo
UK agrees to drop its Apple encryption backdoor request – but digital rights experts aren't ready to celebrate
A person typing on a laptop with a deepfake graphic hovering above it
AI impersonation scams are sky-rocketing in 2025, security experts warn – here’s how to stay safe
Screenshot of Fight Chat Control website
Worried about Chat Control? This website can help you get your say
Latest in How Tos
ChatGPT on mobile
I finally got ChatGPT to stop asking 'Want me to…' at the end of every response – here’s how to do it
Aryna Sabalenka of Belarus celebrates with the winners trophy after defeating Jessica Pegula of the United States to win the Women's Singles Final on Day Thirteen of the 2024 US Open at USTA Billie Jean King National Tennis Center on September 07, 2024 in the Flushing neighborhood of the Queens borough of New York City.
How to watch US Open 2025: live stream tennis online for FREE, order of play, what TV channel, Day 7
Anker power bank on aeroplane tray table with laptop and person reading a book
I’m a power bank nerd and here are the airline rules you need to know
Puzzle pieces representing memory.
ChatGPT’s best hidden feature is a true game changer – here’s how to turn it on
Spam Callers
How to block spam calls on iPhone
Harry Kane of Bayern Munich poses for a photo with the Meisterschale trophy and his medal after the teams 2-0 victory in the Bundesliga match between FC Bayern München and Borussia Mönchengladbach at Allianz Arena on May 10, 2025 in Munich, Germany.
How to watch Bundesliga 2025/26: live stream guide, TV channels and free streams
LATEST ARTICLES
  1. 1
    Who says databases are boring? Microsoft, Google, and AWS all back the Linux Foundation's move to add DocumentDB
  2. 2
    Walmart just dropped an incredibly cheap gaming laptop in its Labor Day sale
  3. 3
    Who says crime doesn't pay? Microsoft has deployed its own security chip on all Azure servers to protect its customers from $10 trillion cybercrime 'pandemic'
  4. 4
    This Samsung tablet is better than any gaming handheld I've ever tried
  5. 5
    I’ve just found a trip planner that puts Google Maps to shame

TechRadar is part of Future US Inc, an international media group and leading digital publisher. Visit our corporate site.

  • About Us
  • Contact Future's experts
  • Contact Us
  • Terms and conditions
  • Privacy policy
  • Cookies policy
  • Advertise with us
  • Web notifications
  • Accessibility Statement
  • Careers

© Future US, Inc. Full 7th Floor, 130 West 42nd Street, New York, NY 10036.

Please login or signup to comment

Please wait...