Share previews without leaking originals
Send an encrypted teaser image that only collaborators with the password can recover.
Encrypt images locally with password-based envelope encryption and embed restore metadata in a PNG tEXt chunk for automatic decryption.
Protect previews before sharing. AES-GCM wraps the data key, AES-CTR masks RGB pixels, and the restore recipe stays inside the PNG. Everything runs offline in your browser.
1. Upload image
2. Set a master password
PBKDF2 + AES-GCM wraps a random AES-CTR data key, then each pixel's RGB values are XOR-masked. Transparent pixels are skipped to keep silhouettes intact.
Encrypted PNGs store the salt, IVs, and wrapped key in a tEXt chunk so decrypt mode is auto-detected when you re-upload.
3. Export
Waiting for an image
Upload an image to start
Send an encrypted teaser image that only collaborators with the password can recover.
Keep design comps in chats while preventing accidental reuse or spoilers.
The PNG tEXt chunk ships salt, IVs, and wrapped keys so recipients can decrypt without extra manuals.
On-device envelope encryption (PBKDF2 + AES-GCM/CTR)
tEXt chunk metadata auto-detects decrypt mode
Skips transparent pixels to preserve silhouettes
No uploads — everything stays in your browser
PNG, JPEG, and WebP work. Encryption always exports as PNG to carry metadata.
The tool derives an AES-GCM key (KEK) from your password and wraps a random 256-bit AES-CTR data key.
RGB channels are XOR-masked with a keystream. Transparent pixels are skipped to preserve outlines.
Salt, IVs, wrapped key, and original MIME are saved into a tEXt chunk alongside the pixels.
Reopen the saved PNG, enter the password, and verify the preview restores before sending it out.