Advertisement

Steganalysis in the Presence of Weak Cryptography and Encoding

  • Andreas Westfeld
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4283)

Abstract

Steganography is often combined with cryptographic mechanisms. This enhances steganography by valuable properties that are originally left to cryptographic systems.

However, new problems for cryptographic mechanisms arise from the context of steganography. There are two sorts of steganographic tools: commercial tools with insecure or badly implemented cryptography and academic proof-of-concepts that abstain from the actual implementation of the cryptographic part.

Comparably to cryptography, steganography evolves in an iterative process of designing and breaking new methods. In this paper we examine the encoding properties and cryptographic functionality of steganographic tools to enable the detection of embedded information in steganograms even if the embedding part was otherwise secure.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Johnson, N.F.: Steganography tools (2002), Online available at: http://www.jjtc.com/Security/stegtools.htm
  2. 2.
    Johnson, N.F.: Steganography and digital watermarking tool table (2003), Online available at: http://www.jjtc.com/Steganography/toolmatrix.htm
  3. 3.
    Petitcolas, F.A.P.: Steganographic software (2005), Online available at: http://www.petitcolas.net/fabien/steganography/stego_soft.html
  4. 4.
    Kerckhoffs, A.: La cryptographie militaire. Journal des sciences militaires IX, 5–38, 161–191 (1883) Online available at: http://www.petitcolas.net/fabien/kerckhoffs/crypto_militaire_1.pdf
  5. 5.
    Collomosse, J.: Blindside (2000), Online available at: http://www.blindside.co.uk
  6. 6.
    Cotting, D.: Stegano (2000), Online available at: http://registry.gimp.org/plugin?id=314
  7. 7.
    Thijssen, J., Zimmerman, H.: Contraband (1998), Online available at: http://www.xs4all.nl/~jult/4u/contrabd.exe
  8. 8.
    Collin, F.D.: EncryptPic (2000), Online available at: ftp://ftp.elet.polimi.it/mirror/Winsite/win95/miscutil/encpic13.exe
  9. 9.
    Nelson, L.: Gif it up (2004), Online available at: http://digitalforensics.champlain.edu/download/Gif-it-up.exe
  10. 10.
    Iceman81: Steggy (2003), Online available at: http://mesh.dl.sourceforge.net/sourceforge/steggy/steggy0.1rc1.tar.gz
  11. 11.
    Upham, D.: Jsteg (2000), Online available at 0urls.txt: http://munitions.vipul.net/software/steganography/jpeg-jsteg-v4.diff.gz
  12. 12.
  13. 13.
    Bauer, M.: AppendX (2003), Online available at: http://www.unet.univie.ac.at/~a9900470/appendX/apX
  14. 14.
    Neobyte Solutions: Invisible (2000), Online available at: http://www.neobytesolutions.com/downloads/invsecr.zip
  15. 15.
    Zaretskiy, E.: Masker (2001), Online available at: http://www.softpuls.com/masker/
  16. 16.
    HappyCactus: Pngstego (2003), Online available at: http://mesh.dl.sourceforge.net/sourceforge/pngstego/pngstego-0.3.2.tar.gz
  17. 17.
    Petitcolas, F.A.P.: MP3Stego (2001), Online available at: http://packetstorm.trustica.cz/crypt/stego/SourceCode/MP3Stego_1.0.14b1_src.tar.gz
  18. 18.
    Hacktivismo: Camera/Shy (2002), Online available at: http://mesh.dl.sourceforge.net/sourceforge/camerashy/CameraShy.0.2.23.1.exe
  19. 19.
    Westfeld, A., Kellermann, B.: Detection utilities (2005), Online available at: http://dud.inf.tu-dresden.de/~westfeld/detectors/
  20. 20.
    Zhang, T., Ping, X.: A fast and effective steganalytic technique against JSteg-like algorithms. In: Proc. of the 2003 ACM Symposium on Applied Computing, Melbourne, Florida, pp. 307–311 (2003)Google Scholar
  21. 21.
    Lee, K., Westfeld, A., Lee, S.-J.: Category attack for LSB steganalysis of JPEG images. In: Shi, Y.Q., Jeon, B. (eds.) IWDW 2006. LNCS, vol. 4283, pp. 35–48. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  22. 22.
    University of Washington: CBIR image database (2004), Online available at: http://www.cs.washington.edu/research/imagedatabase/groundtruth

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Andreas Westfeld
    • 1
  1. 1.Institute for System ArchitectureTechnische Universität DresdenDresdenGermany

Personalised recommendations