ABSTRACT
Steganography is the art of concealing messages through hidden data that is embedded in a carrier medium. Current steganalysis practices focus on detecting and recovering these pieces of hidden data. This paper focuses on instances when neither detecting nor recovering data is desirable, but on proactively cleansing the cover media from possible steganographic data. To support this need, a proof-of-concept steganography obliterator is designed and implemented to partially or completely remove the hidden message from possible media carriers such as image, video, and audio files.
- Abzug, M. T. "MD5 Homepage (unofficial)." (1991). Website: http://userpages.umbc.edu/~mabzug1/cs/md5/md5.html]]Google Scholar
- Anderson, R. J. and Petitcolas, F. A. P. "On the limits of steganography." IEEE Journal of Selected Areas in Communications, 16(4):474--481, May 1998. Special issue on copyright & privacy protection.]]Google ScholarDigital Library
- Arachelian, R. White Noise Storm. Website: http://www.packetstormsecurity.org/crypt/stego/wns210.zip]]Google Scholar
- Brown, A. S-Tools for Windows. (1994) Website: http://www.packetstormsecurity.org/crypt/stego/s-tools/s-tools4.zip]]Google Scholar
- Brown, Andy. "How S-Tools hides your data." S-Tools Help file.]]Google Scholar
- Andy Brown. "How data is hidden in sound." S-Tools Help file.]]Google Scholar
- Doppelt, Adam. "GIFEncoder. Java." Website: http://www.gurge.com/amd/old/java/GIFEncoder/src/GIFEncoder.java]]Google Scholar
- Fridrich, J., Du, R., and Meng, L. Steganalysis of LSB Encoding in Color Images. ICME 2000, New York City, July 31--August 2, New York, USA. 2000.]]Google Scholar
- Fridrich, J. and Goljan, M. Practical Steganalysis of Digital Images - State of the Art. Proc. SPIE Photonics West, Vol. 4675, Electronic Imaging 2002, Security and Watermarking of Multimedia Contents, San Jose, California, January, 2002, pp. 1--13]]Google Scholar
- Hastur, H. Mandelsteg. (1999) Website: http://www.mirrors.wiretapped.net/security/steganography/mand steg/]]Google Scholar
- Johnson, N. F. and Jajodia, S. "Steganalysis of Images Created Using Current Steganography Software." Lecture Notes in Computer Science, vol. 1525. Springer-Verlag, 1998. pp. 273--289.]]Google ScholarCross Ref
- Johnson, N. F. and Jajodia, S. "Exploring Steganography:Seeing the Unseen." IEEE Computer. February 1998. vol.31 no. 2, pp. 26--34.]]Google Scholar
- Kessler, Gary C. "An Overview of Steganography for the Computer Forensics Examiner," Forensic Science Communications, vol. 6, no. 3, July 2004.]]Google Scholar
- Kharrazia, Mehdi, Husrev T. Sencar, and Nasir Memon. "Benchmarking steganographic and steganalysis techniques." Proc. SPIE Vol.5681. January 16--20, 2005. pp. 252--263. Website: http://isis.poly.edu/projects/stego/pubs/spie05.pdf.]]Google Scholar
- Kipper, G. Investigator's Guide to Steganography. CRC Press. Boca Raton, Florida. 2004.]] Google ScholarDigital Library
- 16ado, R. EzStego, Stego Online. Website: http://www.stego.com]]Google Scholar
- Maroney, C. Hide and Seek. (1999) Website: http://www.packetstormsecurity.org/crypt/stego/hideseek/]]Google Scholar
- Provos, N. "Defending Against Statistical Steganalysis." Proceedings of the 10<sup>th</sup> USENIX Security Symposium. Washington, DC. August 13--17, 2001.]] Google ScholarDigital Library
- Provos, N. "Steganography Detection with Stegdetect." Website: http://www.outguess.org/detection.php]]Google Scholar
- Provos, N. OutGuess Download Page. Website: http://www.outguess.org/download.php]]Google Scholar
- Richer, P., "Steganalysis: Detecting hidden information with computer forensic analysis." SANS/GIAC Practical Assignment for GSEC Certification, SANS Institute 2003.]]Google Scholar
- Steganography Analysis and Research Center. Website: http://www.22-wv.com/stegalyzerss.aspx]]Google Scholar
- Saha, Subhasis. "Image Compression - from DCT to Wavelets: A Review." ACM Crossroads 6.3, Data Compression, Spring 2000.]] Google ScholarDigital Library
- School of Informatics, The University of Edinburgh, UK. "Graphics file format." (1997). Website: http://www.dcs.ed.ac.uk/home/mxr/gfx]]Google Scholar
- The Sonic Spot. (2006) Website: http://www.sonicspot.com/guide/wavefiles.html]]Google Scholar
- Sun Microsystems, Inc. (2001) "Java Image I/O API Guide." Website: http://java.sun.com/j2se/l.4.2/docs/guide/imageio/spec/imageio_guideTOC.fm.html.]]Google Scholar
- Wayner, P. Disappearing Cryptography. Information Hiding: Steganography & Watermarking. 2<sup>nd</sup> Ed. Morgan Kaufmann Publishers. San Francisco, CA. 2002.]] Google ScholarDigital Library
Index Terms
- Steganography obliterator: an attack on the least significant bits
Recommendations
An adaptive steganographic method based on the measurement of just noticeable distortion profile
This paper presents an adaptive steganographic method based on just noticeable distortion (JND) profile measurement. According to the input requirements, our method can produce a higher quality or higher embedding capacity stego-image. In the embedding ...
High-performance JPEG steganography using quantization index modulation in DCT domain
This paper presents two JPEG steganographic methods using quantization index modulation (QIM) in the discrete cosine transform (DCT) domain. The two methods approximately preserve the histogram of quantized DCT coefficients, aiming at secure JPEG ...
LSB steganographic method based on reversible histogram transformation function for resisting statistical steganalysis
Statistical steganalysis schemes detect the existence of secret information embedded by steganography. The x^2-detection and Regular-Singular (RS)-attack methods are two well-known statistical steganalysis schemes used against LSB (least significant bit)...
Comments