It is used by Tomb by the way!
Tomb also supports deniable key storage using steganography. One can
tomb buryandtomb exhumekeys to and fromJPEGimages when the utilitysteghideis installed.
The author seems to have also detected a lot of steganography techniques, it actually reminds me of plausible deniability and how it can be easily detected.