Skip to main content
Tech Radar TechRadar the technology experts
Sign in
  • View Profile
  • Sign out
RSS
Asia
flag of Singapore
Singapore
Europe
flag of Danmark
Danmark
flag of Suomi
Suomi
flag of Norge
Norge
flag of Sverige
Sverige
flag of UK
UK
flag of Italia
Italia
flag of Nederland
Nederland
flag of België (Nederlands)
België (Nederlands)
flag of France
France
flag of Deutschland
Deutschland
flag of España
España
North America
flag of US (English)
US (English)
flag of Canada
Canada
flag of México
México
Australasia
flag of Australia
Australia
flag of New Zealand
New Zealand
  • Phones
  • Computing
  • TVs
  • AI
  • Streaming
  • Health
  • Audio
  • VPN
  • More
    • Cameras
    • Home
    • News
    • Reviews
    • Opinion
    • How to
    • Versus
    • Deals
    • Coupons
    • Best
Tech Radar Pro
Tech Radar Gaming
Trending
  • Amazon Prime Day
  • Back to school
  • Nintendo Switch 2
  • Best VPN
  • ChatGPT
  • NYT Wordle today
  • Best laptop
  • Best web hosting
Recommended reading
Security
Security This surprisingly simple way to hide hardware security keys in mainstream flash memory could pave the way for ultra-secure storage very soon
Fake PDF Converter
Security Cybercriminals are impersonating a popular online PDF converter to steal your data
ChatGPT
Artificial Intelligence You can't hide from ChatGPT – new viral AI challenge can geo-locate you from almost any photo – we tried it and it's wild and worrisome
Futuristic cyber cat in cyberpunk style
Security This dangerous new malware is hitting iOS and Android phones alike - and it's even stealing photos and crypto
A laptop showing lots of email notifications
Security How to send an anonymous email
Caution sign data unlocking hackers. Malicious software, virus and cybercrime, System warning hacked alert, cyberattack on online network, data breach, risk of website
Security Hackers could one day use novel visual techniques to manipulate what AI sees - RisingAttacK impacts 'most widely used AI computer vision systems'
ChatGPT
Cyber Security Beware, another ChatGPT trend threatens your privacy – here's how to stay safe
  1. Computing
  2. Computing Security

How to hide files in images using OpenStego

How-to
By Nate Drake published 18 September 2017

When you purchase through links on our site, we may earn an affiliate commission. Here’s how it works.

Digital steganography is the technique of hiding one file inside another. If, for instance, you have a buried chest of treasure, you can store the coordinates inside a harmless looking picture. To the naked eye, the file would seem to be an image like any other, but you and those you trust can extract the secret data with specialist tools.

OpenStego is one such tool. This handy free and open source app can be used to take any files you want and keep them secret by disguising them as random digital ‘noise’ inside a larger one.

In this guide, you’ll learn how to download and run OpenStego, as well as the basics of hiding your very first, password-protected, message.

Page 1 of 11
Page 1 of 11
1. Download OpenStego

1. Download OpenStego

Open your browser and navigate to the OpenStego website. Click 'Downloads' at the top right. Scroll down to find the right version of OpenStego for your processor e.g. 'Setup-OpenStego-0.7.1.exe'. 

Click on the file and choose 'Run'. Windows 10 will ask you to confirm you want to let the app make changes. Click 'Yes'. 

OpenStego setup will now launch. Click 'I Agree' on the License Agreement page, check the destination folder, then click 'Install'. Once you see the screen reading 'Installation Complete', click 'Close' at the bottom right. Do not run OpenStego for now.

Page 2 of 11
Page 2 of 11
2. Install Java Runtime Environment

2. Install Java Runtime Environment

OpenStego is written in Java so you must install the JRE (Java Runtime Environment) to load it. Click on the offline installer for your processor architecture e.g. Windows x64 Offline. Choose ‘Run’ once again and click ‘Yes' to allow the JRE to make changes to your computer.

Java Setup will now start. Click ‘Install’ to begin, then ‘Close’.

Click the Start Menu and select ‘Run OpenStego’ in the ‘Recently Added’ section. Windows 10 may start searching for 'javaw.exe'. If so, give it a few minutes to complete then choose to 'Fix' the broken link. OpenStego will now launch.

Page 3 of 11
Page 3 of 11
3. Create your message file

3. Create your message file

Before using OpenStego, you need to create the secret file you want to remain hidden. There's no restriction on the format of 'message' files – this can be a text document or another image, however it has to be smaller than the cover file it hides inside. 

If your file is very large, OpenStego supports splitting it across a number of cover files. However, it's probably easier to encrypt and upload it to a website, then create a text file detailing the URL and password.

See our guide on Encryption Tools for more information. 

The example message file above is a QR code containing GPS coordinates of buried treasure.

Page 4 of 11
Page 4 of 11
4. Choose your cover file

4. Choose your cover file

The cover file should be a harmless looking image, inside which the 'message' file will be stored. Give some careful thought to the image you choose. In the first instance, make sure it's bigger than the 'message' file.

Try to use a picture you've taken yourself. Otherwise, someone could compare the file you produce with OpenStego to the original and work out where data is hidden. 

Make sure there are plenty of photos on your computer and that you have a plausible reason for having this one on your hard drive. For instance, if you have an interest in photography or history, you could use a picture of a vintage camera.

Page 5 of 11
Page 5 of 11
5. Configure the file settings

5. Configure the file settings

Once you've chosen your 'message' and 'cover' files, return to OpenStego. Click the button besides ‘Message File’ and select the file you wish to hide.

Next, click the button inside the ‘Cover File’ box. Navigate to the harmless cover file you chose earlier. Click ‘Open’ to confirm.

Finally, click the button inside the ‘Output Stego File’ box. Navigate to the folder where you want to store the output stego file e.g. Desktop, then enter a name for it in the box below e.g. camera1. Click ‘Open’ once again.

Page 6 of 11
Page 6 of 11
6. Choose encryption settings

6. Choose encryption settings

Head down to the ‘Options’ box. From here you can choose to encrypt your message file with a password before hiding it inside the cover file. Without the correct password, the data will be irretrievable. 

If you wish to do this, click on the ‘Encryption Algorithm’ box first. From here you can choose how to protect your data. The default setting (AES128) is perfectly secure, however you can increase the encryption strength to AES 256 if you wish. (This may slow down the extraction process slightly).

DES is no longer secure, so do not choose it.

Enter your password in the 'Password' field, then again under 'Confirm Password'. 

Page 7 of 11
Page 7 of 11
7. Hide your data

7. Hide your data

Click the ‘Hide Data’ button at the bottom-right of the screen to begin the process of concealing your message file inside the cover file. OpenStego will state it's processing the file, then display a message saying that the message has been embedded. Click ‘OK’. 

Next, make sure to erase the original 'message' and 'cover' file securely. This way there'll be no way to retrieve your secret file without using OpenStego and the password if you set one.

Remember that if a malicious user finds OpenStego installed on your Windows PC, they may realise you have hidden files. 

Page 8 of 11
Page 8 of 11
8. Test extracting files

8. Test extracting files

If you want to test if OpenStego hid the file properly, click the ‘Extract Data’ button at the top left of the window. 

Click the button besides ‘Input Stego File’ and find the stego file you created earlier e.g. camera1.png. Next, click the button in the box marked ‘Output folder for Message file’ to choose where to extract the 'message' file.

If you set a password earlier, make sure to type this into the password field. Finally click ‘Extract Data’. If successful, you'll see a notification saying the 'message' file has been extracted.

Page 9 of 11
Page 9 of 11
9. Generate signature to watermark files

9. Generate signature to watermark files

The downside of using steganography is there's no automatic way to stop someone from replacing your secret file with another. OpenStego tries to prevent this by using digital watermarking. 

You can do this through generating a signature using a passphrase, which you can then embed as a watermark into your secret file. 

To get started, click ‘Generate’ signature on the left hand side and type in any passphrase in the box marked ‘Passphrase to be used to Generate Signature’. 

Click the button in the box marked ‘Output Signature File’. Navigate to the location where you wish to store the signature file and type a name in the field at the bottom.

Click ‘Generate Signature’ to create the signature file.

Page 10 of 11
Page 10 of 11
10. Embed the watermark using your signature

10. Embed the watermark using your signature

To embed the signature in a message file, click ‘Embed Watermark’ on the left of the window.

Click the button beside ‘File to be Watermarked’ and choose the message file you want to watermark.

Do the same for the box marked ‘Signature File’ and choose the one you just created.

Finally click the button besides ‘Output Watermarked File’ and choose a location and name for the new message file. Click ‘Embed Watermark’ to continue.

If anyone wishes to verify your signature using OpenStego, make sure they have a copy of your signature file then ask them to click ‘Verify Watermark’. From there they can choose to compare the watermarked image to your signature. 

  • Here's how to securely destroy data
Page 11 of 11
Page 11 of 11
Nate Drake

Nate Drake is a tech journalist specializing in cybersecurity and retro tech. He broke out from his cubicle at Apple 6 years ago and now spends his days sipping Earl Grey tea & writing elegant copy.

See more Computing How Tos
Read more
Security
This surprisingly simple way to hide hardware security keys in mainstream flash memory could pave the way for ultra-secure storage very soon
Fake PDF Converter
Cybercriminals are impersonating a popular online PDF converter to steal your data
ChatGPT
You can't hide from ChatGPT – new viral AI challenge can geo-locate you from almost any photo – we tried it and it's wild and worrisome
Futuristic cyber cat in cyberpunk style
This dangerous new malware is hitting iOS and Android phones alike - and it's even stealing photos and crypto
A laptop showing lots of email notifications
How to send an anonymous email
Caution sign data unlocking hackers. Malicious software, virus and cybercrime, System warning hacked alert, cyberattack on online network, data breach, risk of website
Hackers could one day use novel visual techniques to manipulate what AI sees - RisingAttacK impacts 'most widely used AI computer vision systems'
Latest in Computing Security
In this photo illustration, a DeepSeek logo is seen displayed on a smartphone with the flag of Germany in the background.
Deepseek faces ban in Germany as privacy watchdog reports the app to Google and Apple as "illegal content"
EU
The EU could be scanning your chats by October 2025 – here's everything we know
A phone showing the download page for Microsoft Authenticator
Microsoft is phasing out passwords soon – here's why passkeys are replacing them and what to do next
A person holding a phone looking at a scam text with warning signs around
FBI issues urgent warning about new SMS toll scam – here's how to spot it and what to do
Poland's Prime Minister Donald Tusk attend a joint press conference with the European Commission President after a meeting of the College of Commissioners with members of the Polish government in Gdansk, Poland on February 7, 2025.
Chat Control – Poland's EU Presidency gives up on the voluntary scan of your encrypted chats
The eyes of Big Brother is watching secretly from behind the digital curtain of the EU flag
Experts "deeply concerned" by the EU plan to weaken encryption
Latest in How Tos
Three members of staff wave towards a red helicopter in Billion Dollar Playground
How to watch Billion Dollar Playground season 1 for free online from anywhere
Jofra Archer in practice for England cricket.
How to watch England vs India 3rd Test: Live stream cricket online – England 251-4 after Day 1
The Amazing Race Canada presenter standing in front of the season 11 cast in an American Football stadium.
How to watch The Amazing Race Canada season 11 online FREE from anywhere
Big Brother Season 27 promo image
How to watch Big Brother USA Season 27 online from anywhere
Charlotte (Annabel Scholey), Jacob (Sam Palladio) and Mia (Aggy K Adams) in a nightclub in The Couple Next Door season 2
How to watch The Couple Next Door season 2 for free online from anywhere
Jonas Vingegaard riding in the 2024 Tour de France time trial at Stage 7
Tour de France 2025 Stage 5 live stream: How to watch cycling for FREE from anywhere
LATEST ARTICLES
  1. 1
    Qantas confirms 5.7 million customers impacted by data breach
  2. 2
    Ignore Prime Day right now – all of my favorite Dell laptops are even cheaper directly from Dell
  3. 3
    Looking for a last-minute cheap Meta Quest 3 upgrade? You've still got time to grab this Prime Day deal
  4. 4
    Bargain Beats! Get up to 50% off beats headphones in the Amazon Prime Day Sale
  5. 5
    Samsung's massive TV sale is better than Prime Day - save up to $1,999, plus freebies

TechRadar is part of Future US Inc, an international media group and leading digital publisher. Visit our corporate site.

  • About Us
  • Contact Future's experts
  • Contact Us
  • Terms and conditions
  • Privacy policy
  • Cookies policy
  • Advertise with us
  • Web notifications
  • Accessibility Statement
  • Careers

© Future US, Inc. Full 7th Floor, 130 West 42nd Street, New York, NY 10036.

Please login or signup to comment

Please wait...