Right now. Just go. Then come straight back, y’hear?
(Heh. “Rubber hose cryptanalysis” is not a phrase I ever heard before, but I have worried about the concept.)
ETA: Once upon a time I wrote a book in which the heroes used steganographic encryption as “encrypted communications for the complete idiot.” To this day I’ve no idea whether it really is.

















































Stego will work okay if you are not specifically targeted. If you have come up as a threat, it is likely they would consider the possibility of steg and run your picture files through the appropriate software. If you are not targeted, hiding pictures of your cat in pictures of your cat seems to be a lot of work. Basically if it is a software solution, they already know about and are at least working on a way to compromise. I am pretty sure the CIA and NSA have a couple of experts or two on hiding information and cryptography.
It probably wouldn’t prevent the rubber hose attack. The assumption is it is being used for pain-compliance when I am sure it is often used for the enjoyment of evil persons.
Steno is putting text information into a image file with software to insert and remove the txt. Problem is if you put a lot of txt information in it will bloat the img file abnormally, and stand out to a smart investigator. Bitmaps are large to begin with so they tend to be more popular for steno work, which in return draws attention.
Good for inserting a short paraphrase you wish to send someone else. Encode it into that pic of that old man in the melon hat to my right. –>>