Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

A method for automatic identification of signatures of steganography software

Published: 01 June 2010 Publication History

Abstract

A fully automated, blind, media-type agnostic approach to steganalysis is presented here. Steganography may sometimes be exposed by detecting automatically characterized regularities in output media caused by weak implementations of steganography algorithms. Fast and accurate detection of steganography is demonstrated experimentally here across a range of media types and a variety of steganography approaches.

References

[1]
N. F. Johnson and S. Jajodia, "Steganalysis of images created using current steganography software," in Proc. Int. Workshop Information Hiding, ser. LNCS, London, U.K., 1998, vol. 1525, pp. 273-289.
[2]
A. Westfeld and A. Pfitzmann, "Attacks on steganographic systems," in Proc. Int. Workshop Information Hiding, ser. LNCS, London, U.K., 2000, vol. 1768, pp. 61-76.
[3]
J. Fridrich and M. Goljan, "Practical steganalysis of digital images: State of the art," Proc. SPIE, Security and Watermarking of Multimedia Contents IV, vol. 4675, pp. 1-13, 2002.
[4]
N. Provos and P. Honeyman, "Hide and seek: An introduction to steganography," IEEE Security Privacy, vol. 1, no. 3, pp. 32-44, May/Jun. 2003.
[5]
J. Fridrich, "Steganalysis," in Multimedia Security Technologies for Digital Rights Management. Amsterdam, The Netherlands: Elsevier, 2006, ch. 14, p. 352.
[6]
K. Curran and K. Bailey, "An evaluation of image-based steganography methods," Int. J. Digital Evidence, vol. 2, no. 2, 2003.
[7]
A. Westfeld, "F5-a steganographic algorithm: High capacity despite better steganalysis," in Proc. Int. Workshop Information Hiding, ser. LNCS, 2001, vol. 2137, pp. 289-302.
[8]
A. Brown, STools v4.0 {Online}. Available: ftp://ftp.demon.net/pub/ mirrors/crypto/idea/code/s-tools4.zip
[9]
N. F. Johnson and S. Jajodia, "Exploring steganography: Seeing the unseen," Computer, vol. 31, no. 2, pp. 26-34, 1998.
[10]
A. Westfeld, "Detecting low embedding rates," in Proc. Int. Workshop Information Hiding, ser. LNCS, 2002, vol. 2578, pp. 324-329.
[11]
J. Fridrich, M. Goljan, and D. Hogea, "Attacking the OutGuess," in Proc. ACM Workshop on Multimedia and Security, 2002, pp. 1-4.
[12]
J. Fridrich, M. Goljan, and R. Du, "Detecting LSB steganography in color and gray-scale images," Special Issue on Security, IEEE Multimedia, vol. 8, no. 4, pp. 22-28, Oct./Dec. 2001.
[13]
G. Bell, "The dangers of webcrawled datasets," First Monday vol. 15, no. 2, Feb. 1, 2010 {Online}. Available: http://firstmonday.org/htbin/ cgiwrap/bin/ojs/index.php/fm/article/view/2739/2456
[14]
T. Pevny and J. Fridrich, "Novelty detection in blind steganalysis," in Proc. ACM Workshop on Multimedia and Security, 2008, pp. 167-176.
[15]
M. Kharrazi, H. T. Sencar, and N. Memon, "Benchmarking steganographic and steganalysis techniques," Proc. SPIE, Security, Steganography, and Watermarking of Multimedia Contents VII, vol. 5681, pp. 252-263, 2005.

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image IEEE Transactions on Information Forensics and Security
IEEE Transactions on Information Forensics and Security  Volume 5, Issue 2
June 2010
158 pages

Publisher

IEEE Press

Publication History

Published: 01 June 2010
Accepted: 13 March 2010
Revised: 13 March 2010
Received: 27 July 2009

Author Tags

  1. Blind
  2. blind
  3. media-type agnostic
  4. steganalysis
  5. steganography

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 13 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Image Steganography Approaches and Their Detection Strategies: A SurveyACM Computing Surveys10.1145/369496557:2(1-40)Online publication date: 10-Oct-2024
  • (2024)Security analysis and improvement of DWFCATDigital Signal Processing10.1016/j.dsp.2024.104638153:COnline publication date: 1-Oct-2024
  • (2015)Different methodology for image steganography-based data hidingInternational Journal of Information and Communication Technology10.1504/IJICT.2015.0703307:4/5(521-536)Online publication date: 1-Jul-2015
  • (2013)Moving steganography and steganalysis from the laboratory into the real worldProceedings of the first ACM workshop on Information hiding and multimedia security10.1145/2482513.2482965(45-58)Online publication date: 17-Jun-2013
  • (2012)Insider threats in corporate environmentsProceedings of the Fifth Balkan Conference in Informatics10.1145/2371316.2371374(271-274)Online publication date: 16-Sep-2012
  • (2012)A framework for avoiding steganography usage over HTTPJournal of Network and Computer Applications10.1016/j.jnca.2011.10.00335:1(491-501)Online publication date: 1-Jan-2012

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media