OpenPuff

The program is notable for being the first steganography tool (version 1.01 released in December 2004) that: Last revision supports a wide range of carrier formats: OpenPuff is used primarily for anonymous asynchronous data sharing: The advantage of steganography, over cryptography alone, is that messages do not attract attention to themselves.

[1] OpenPuff is a semi-open source program: Cryptographic algorithms (16 taken from AES, NESSIE and CRYPTREC) are joined into a unique multi-cryptography algorithm: Extensive testing has been performed on the statistical resistance properties of the CSPRNG and multi-cryptography modules, using the ENT,[3] NIST [4] and DIEHARD[5] test suites.

There will always be a non-negligible probability of being detected, even if the hidden stream behaves like a "natural container" (unpredictable side-effects, being caught in Flagrante delicto, etc.).

Resisting these unpredictable attacks is also possible, even when the user is forced (by legal or physical coercion) to provide a valid password.

[8][9] Deniable steganography (a decoy-based technique) allows the user to deny convincingly the fact that sensitive data is being hidden.

Multi cryptography architecture
Multi cryptography architecture
CSPRNG
Carrier bit encoding
Deniable steganography usage