Overview:
This steganography tool allows you to hide secret messages or entire files within visible
text and carrier files (such as images or videos or other binaries). The tool employs advanced
techniques to cloak your data without drawing attention. You can also fetch Nostr event and
check if text includes hidden messages.
How It Works:
Everything performed by this tool happens entirely client-side, meaning your data never
leaves your device. The tool has two main functions: Text Steganography and File Steganography.
The tool converts hidden messages into binary strings using zero‑width characters, appending them
invisibly to your visible message. Hidden files are encoded into Base64 and appended to carrier files using a unique marker.
Encryption:
When you provide an encryption key, the tool encrypts the hidden content using AES encryption.
The same key is required to decrypt and extract the hidden data. It is advised to protect any
private information or digital payment invoices with a password, as bots can easily be programmed
to immediately claim these invoices.
Steganography Methods:
This tool leverages multiple steganography techniques and none of them is LSB (Least Significant Bit):
\u200C
and \u200D
to represent bits 0 and 1 respectively. Used for plain text and emoji-based carrier messages.
\u200B
, \u200C
, and \u200D
.
File Hiding Capabilities:
You can hide images, text files, or any file type - each file is encoded (and optionally encrypted) before being appended to a carrier file.
However, please be aware that when you share images online, many social media platforms and websites automatically
compress or convert the file format. This process often reduces file size and standardizes formats, but it may also
remove additional data embedded within the file. In some cases, these platforms strip out metadata or extra hidden
information during upload. As a result, if your hidden data relies on being preserved exactly, it might be altered
or lost once shared on these sites.
Best Image Formats for Data and Text Embedding:
Lossless image formats are generally the best choice for embedding data, since they preserve every bit of the original
image without discarding information. PNG and TIFF are popular options because they maintain all data,
ensuring that your hidden information remains intact. Other lossless formats, like GIF, can also be used; however,
keep in mind that GIFs are limited to a 256-color palette, which may not be ideal if you require higher color fidelity or
have complex images. Additionally, formats like BMP or lossless modes of WebP might be considered, but
they often have compatibility issues or less efficient compression compared to PNG.
On the other hand, the vast majority of images on the internet—over 80%—are in the JPEG format. JPEG uses lossy
compression, which significantly reduces file size by discarding some image data. This efficiency is critical for storing
and transferring huge volumes of images (saving gazillions of terabytes of disk space), which is why it is so widely adopted.
However, because JPEG compression removes some data permanently, it is not ideal for embedding information that needs to be
preserved exactly. For preserving hidden data, a lossless format like PNG is usually recommended.
What is Nostr?
Nostr, short for “Notes and Other Stuff Transmitted by Relays,” is a permissionless, censorship-resistant, open-source
protocol (and much more...) designed to empower users and uphold the original principles of the internet: decentralization, freedom of expression,
and user control. Unlike traditional social networks like Twitter or Instagram, Nostr operates on a client-relay model,
eliminating centralized servers and giving users full ownership of their identity, data, audience and development on top of it.
Learn more about Nostr.
Nostr Integration:
The tool uses the Nostr protocol to fetch events and extract hidden messages directly from relays.
By entering a Nostr event ID (HEX, note1, nevent) and optionally relay URLs, the tool connects via WebSockets, fetches the event,
and displays both the original and hidden secret message hidden in the text or emoji.
When pasting in the nevent string the tool will automatically extract and use its relay hints.
Secrets in files are not available with this option. For testing purposes, you can use this event ID:
0001917b7176006a407f4c7d4a9b7408064fee7db0ad8a5b4f0f825bf0321b1b
or this one with an image where image contain a hidden message:
note1hxdpv5xcneu6vqacrfg4adjh5n7zvue284fdu64x20ezlh900cqsqpdrdj
Obfuscation & Cipher Tools
This tool allows you to apply a sequence of text transformations to hide, scramble, or encode messages.
You can combine multiple methods to produce complex and layered ciphers that resemble gibberish or random text,
yet remain fully reversible when the correct method sequence is used.
The available methods include encoders/decoders for Base64, Base32, Base58,
Binary, and Morse Code, as well as a collection of custom-built text manipulation techniques like
Full Flip, Word Flip, Sentence Inverter, Readable Reverser, and
Scrambler.
These transformations can be stacked together, forming a custom "method sequence" that records the order in which each method was applied.
When you finish your transformation, you can copy this sequence in a format like mSeq=1,3,7
.
Later, the tool can automatically interpret different input formats such as 1,3,7
, 1 3 7
, 1.3.7
,
or even 1 know a s3cre7
, making it flexible for sharing and reuse.
The system also smartly detects incompatible methods and will guide you by disabling invalid options to prevent errors.
To decipher a message, you simply provide the text and the correct method sequence in reverse order.
This restores the original text exactly as it was before.
Special Notes:
Visual effects after successful decoding:
If the decoding of files and messages is successful, you will receive visual feedback.
In some cases, such as when the message includes at the start of the message prefixes
like bitcoin:
, cashu
, lnbc
, monero:
, nostr:
and others,
it will show a visual effect relevant to the message content. If no special prefixes are included, you'll only see sparkles.
If you have any special visual effects requests, please reach out to me.
If you find this website valuable, consider contributing a sat or two. Thank you.
Submit either text or a file for encoding, but not both at the same time. Only one object is allowed per submission.