I'm sure an implementation of this exists somewhere already, but I was bored today. The scripts I've provided are for educational purposes only. I do NOT suggest using them, and take no responsibility if you choose to for illegal purposes.
So, say you have 2 dummy images, dummy1 and dummy2, and a real image you want to keep secret. For simplicity, assume all these images are the same size. Then, you can create a key image which generates the original secret image from the 2 dummy images.
Firstoff, a nice steaming plate of copypasta for u.
This: http://www.newslobster.com/random/ho...ins-on-windows is the original link to where you can read all the fantastic text below plus a little bit more. I thought it would be moar useful here though, so enjoy!
Note: this deals with software setup and not hardware.
Living Securely in a Digital World Pt II
By Ghost Prototype, for totse2.com
While my first article focused on securing your computer from physical access, this article will discuss methods of remaining anonymous and secure while accessing the internet. This guide is not exhaustive, and may be continued in a third part on a later date. Iím open to suggestions and corrections as well on this subject, and look forward to discussing this with you all in the comments section.
Living Securely in a Digital World, Part I
By Ghost Prototype
Here is the first half of a basic guide on computer security I wrote up. It's aimed at people who don't know much about keeping things private, but want to at least do something about it. Enjoy!
Have something to hide? The first and best line of defense is encryption. What is it? Essentially, itís a way of scrambling data so that it canít be read without a code. A free program to do this with is called Truecrypt, and can be downloaded from truecrypt.org. It works on all current Windows OSes, Mac OSx, and most Linux distros. It works fantastically well, is easy to set up, and very easy to use. Options range from having single encrypted files to entire hidden encrypted operating systems.