We collect steganographic tools and examine their cryptographic functionality to enable the detection of steganograms even if the embedding part is otherwise secure.
In brief:
We are confident to find new vulnerabilities in steganographic tools.