About Site Map Submit Contact Us Log in | Create an account
Create an account Log In
Average Rating
User Rating:
Visitors Rating:
My rating:

Write review
  • License: Freeware
  • Last update: 7 years ago
  • Total downloads: 128
  • Price: Free |
  • Operating system: Win All
  • Publisher: Pmcc (12 other programs)
See full specifications

windows default iconBon Kyu Bon Publisher's description

A steganography program that allows you to easily write and embedd hidden messages

Bon Kyu Bon is a steganography program that makes it easier to write hidden messages in such a way that no one apart from the intended recipient knows of the existence of the message.

- The encryption used for storing message data is Rijndael/AES 256-bit with "salt".
- Messages are concealed within the lowest bits of noisy images or sound files.
- Supports BMP, GIF, TIF, PNG, WAV, MID and .NET Assemblies.

What is Steganography?
- Steganography is really nothing new, as it has been around since the times of ancient Rome. For example, in ancient Rome and Greece, text was traditionally written on wax that was poured on top of stone tablets. If the sender of the information wanted to obscure the message - for purposes of military intelligence, for instance - they would use steganography: the wax would be scraped off and the message would be inscribed or written directly on the tablet, wax would then be poured on top of the message, thereby obscuring not just its meaning but its very existence.

- According to Dictionary.com, steganography (also known as "steg" or "stego") is "the art of writing in cipher, or in characters, which are not intelligible except to persons who have the key; cryptography".

- In computer terms, steganography has evolved into the practice of hiding a message within a larger one in such a way that others cannot discern the presence or contents of the hidden message. In contemporary terms, steganography has evolved into a digital strategy of hiding a file in some form of multimedia, such as an image, an audio file (like a .wav or mp3) or even a video file.

What is Steganography used for?
- Like many security tools, steganography can be used for a variety of reasons, some good, some not so good. Legitimate purposes can include things like watermarking images for reasons such as copyright protection. Digital watermarks (also known as fingerprinting, significant especially in copyrighting material) are similar to steganography in that they are overlaid in files, which appear to be part of the original file and are thus not easily detectable by the average person.

- Steganography can also be used as a way to make a substitute for a one-way hash value (where you take a variable length input and create a static length output string to verify that no changes have been made to the original variable length input). Further, steganography can be used to tag notes to online images (like post-it notes attached to paper files). Finally, steganography can be used to maintain the confidentiality of valuable information, to protect the data from possible sabotage, theft, or unauthorized viewing.

- Unfortunately, steganography can also be used for illegitimate reasons. For instance, if someone was trying to steal data, they could conceal it in another file or files and send it out in an innocent looking email or file transfer. Furthermore, a person with a hobby of saving pornography, or worse, to their hard drive, may choose to hide the evidence through the use of steganography. And, as was pointed out in the concern for terroristic purposes, it can be used as a means of covert communication. Of course, this can be both a legitimate and an illegitimate application.

What's New in This Release:

- Added Right To Left support.
- Bug fixes.

System Requirements:

- .NET Framework 3.5 or later.
Program Release Status:
Program Install Support: Install and Uninstall

Bon Kyu Bon Tags:

Click on a tag to find related softwares

Is Bon Kyu Bon your software?

Manage your software

Most Popular

windows default icon Hotspot Shield 3.20
Hotspot Shield : ensure you are private, secure, and anonymous online!
McAfee SuperDAT Update 7354 icon McAfee SuperDAT Update 7354
McAfee virus pattern and engine updates.
Avira Antivir Virus Definition File Update 19-02-2014 icon Avira Antivir Virus Definition File Update 19-02-2014
A comprehensive, easy to use antivirus program, designed to offer reliable virus protection to home-users only... Read more
windows default icon Hack password 1.0.1
Hides the windows password character. Finally you can see what you type.
windows default icon Quick Heal AntiVirus 2012
Quick Heal AntiVirus 2010, with its intuitive and easy-to-use interface

Related Category

» Access Control (455)
» Firewalls (60)
» Other (1171)