It is used by Tomb by the way!
Tomb also supports deniable key storage using steganography. One can
tomb bury
andtomb exhume
keys to and fromJPEG
images when the utilitysteghide
is installed.
The author seems to have also detected a lot of steganography techniques, it actually reminds me of plausible deniability and how it can be easily detected.