Ranked in these QuestionsQuestion Ranking
Pro Hides file in JPEG image
File Camouflage allows you to encrypt your sensitive information and then after hide it in the JPEG image of your choice. With this program an innocent family photo or photo of your pet can be used to disguise your most sensitive encrypted information.
Pro Effective second level of protection
File Camouflage is an effective second level of protection. After encrypting and password protecting your sensitive information with AES, File Camouflage makes sure only your intended recipient knows there is even a file to decrypt by hiding it in a JPEG.
Pro Ability to send an EXE file via email
Many email providers are not able to send EXE files but File Camouflage not only protects it but allows the file to be sent.
Pro Easy to use
Hiding your sensitive information with File Camouflage is extremely easy. The whole process is explained very well even for an inexperienced user.
Con Frequently prompts you to donate
File Camouflage is free although the developer does proclaim it "donationware." As a result the program frequently and annoyingly begs that you donate.
Con Requires both sender and recipient to use File Camouflage
In order for the recipient to receive the intended information they have to download and use File Camouflage.
Con Encourages improper use of steganography
To hide a file in an image you need two things:
One, that the attacker cannot find the source image i.e. it has to be an image made by the user (preferably a photograph of a visually complex scene) and never put on the internet (using the pac_tron image would render the use of steganography moot, as the attacker can merely subtract a suspect image from a copy of the source image) and
two, that the file to be hidden is smaller than the cover image. With the best techniques today you can embed a file about 10% of the size of the cover image. The example in the doc hides a file 21,500% of the size of the cover image.
If you use steganography improperly you get no security, esp. as governments believe senior terrorists use steganography and thus search for it very, very, carefully.