StegoToolkit

SVG Steganography Extractor

Extract data hidden inside SVG vector graphic files.

Client-Side Only
All SVG Files
Free & No Logs

Upload Your SVG File

Upload an SVG file to use as the carrier for your hidden data

or drag and drop

Supports: .svg files (XML-based vector graphics) • Max: 20 MB

Why SVG for Steganography?

SVG is XML text, not pixels. This enables hiding data in coordinates, metadata, comments, or attributes — methods that survive platform compression unlike JPEG/PNG.

How the Decoder Works (4 steps)

  1. Upload the SVG file that may contain a hidden payload
  2. Select the detection method (or use Auto to scan all methods)
  3. Enter a password if the payload was encrypted during encoding
  4. Click Decode — the hidden message or file will be extracted below

6 SVG Detection Methods Compared

MethodTechniqueStealthBest For
Auto DetectScans all methods in orderUnknown encoder
XML CommentReads <!-- steg:data --> blocks🔴 LowQuick extraction
Metadata / DescReads <metadata> / <desc> tags🟡 MediumStandard use
Data AttributesReads data-* attrs on SVG elements🟡 MediumWeb dev SVGs
Float Coord LSBDecodes last decimal of coordinates🟢 HighStealthy path SVGs
Color RGB LSBDecodes last bit of R, G, B hex🟡 MediumIllustration SVGs

Frequently Asked Questions

Is my SVG uploaded to a server?

Never. All decoding happens entirely in your browser. Your file never leaves your device.

Which method should I try first?

Auto Detect. It scans all five methods in order and returns the first payload it finds. Only pick a specific method if you know how the SVG was encoded.

Why is the output garbled?

The payload was likely encrypted. Enter the same password used during encoding and try again.

Can I extract files, not just text?

Yes. If the hidden payload is a file it will be offered as a download in its original format.

Will Float Coord LSB work on every SVG?

Only if the SVG has path coordinates with enough decimal precision. Simple icon SVGs with integer coordinates have no room to hide bits.