New feature ? steganography bruteforce

I recently came accross a JPG file with some stegano data inside.
I use "stegbreak" to try to bruteforce the key (dictionnary) to decode the embeded data.
It uses CPU and it's very long.

According to stegbreak, it manages 3 ways to hide data (jphide, jsteg-shell, outguess)

Is it possible to implement in oclhashcat some stegano bruteforce features like that ?

Anybody interested ?
try adding it to trac, where it should be.
This is an area dealt with by high priced forensic software.