skip to main content
10.1145/1231047.1231066acmotherconferencesArticle/Chapter ViewAbstractPublication PagesinfoseccdConference Proceedingsconference-collections
Article

Steganography obliterator: an attack on the least significant bits

Published:22 September 2006Publication History

ABSTRACT

Steganography is the art of concealing messages through hidden data that is embedded in a carrier medium. Current steganalysis practices focus on detecting and recovering these pieces of hidden data. This paper focuses on instances when neither detecting nor recovering data is desirable, but on proactively cleansing the cover media from possible steganographic data. To support this need, a proof-of-concept steganography obliterator is designed and implemented to partially or completely remove the hidden message from possible media carriers such as image, video, and audio files.

References

  1. Abzug, M. T. "MD5 Homepage (unofficial)." (1991). Website: http://userpages.umbc.edu/~mabzug1/cs/md5/md5.html]]Google ScholarGoogle Scholar
  2. Anderson, R. J. and Petitcolas, F. A. P. "On the limits of steganography." IEEE Journal of Selected Areas in Communications, 16(4):474--481, May 1998. Special issue on copyright & privacy protection.]]Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Arachelian, R. White Noise Storm. Website: http://www.packetstormsecurity.org/crypt/stego/wns210.zip]]Google ScholarGoogle Scholar
  4. Brown, A. S-Tools for Windows. (1994) Website: http://www.packetstormsecurity.org/crypt/stego/s-tools/s-tools4.zip]]Google ScholarGoogle Scholar
  5. Brown, Andy. "How S-Tools hides your data." S-Tools Help file.]]Google ScholarGoogle Scholar
  6. Andy Brown. "How data is hidden in sound." S-Tools Help file.]]Google ScholarGoogle Scholar
  7. Doppelt, Adam. "GIFEncoder. Java." Website: http://www.gurge.com/amd/old/java/GIFEncoder/src/GIFEncoder.java]]Google ScholarGoogle Scholar
  8. Fridrich, J., Du, R., and Meng, L. Steganalysis of LSB Encoding in Color Images. ICME 2000, New York City, July 31--August 2, New York, USA. 2000.]]Google ScholarGoogle Scholar
  9. Fridrich, J. and Goljan, M. Practical Steganalysis of Digital Images - State of the Art. Proc. SPIE Photonics West, Vol. 4675, Electronic Imaging 2002, Security and Watermarking of Multimedia Contents, San Jose, California, January, 2002, pp. 1--13]]Google ScholarGoogle Scholar
  10. Hastur, H. Mandelsteg. (1999) Website: http://www.mirrors.wiretapped.net/security/steganography/mand steg/]]Google ScholarGoogle Scholar
  11. Johnson, N. F. and Jajodia, S. "Steganalysis of Images Created Using Current Steganography Software." Lecture Notes in Computer Science, vol. 1525. Springer-Verlag, 1998. pp. 273--289.]]Google ScholarGoogle ScholarCross RefCross Ref
  12. Johnson, N. F. and Jajodia, S. "Exploring Steganography:Seeing the Unseen." IEEE Computer. February 1998. vol.31 no. 2, pp. 26--34.]]Google ScholarGoogle Scholar
  13. Kessler, Gary C. "An Overview of Steganography for the Computer Forensics Examiner," Forensic Science Communications, vol. 6, no. 3, July 2004.]]Google ScholarGoogle Scholar
  14. Kharrazia, Mehdi, Husrev T. Sencar, and Nasir Memon. "Benchmarking steganographic and steganalysis techniques." Proc. SPIE Vol.5681. January 16--20, 2005. pp. 252--263. Website: http://isis.poly.edu/projects/stego/pubs/spie05.pdf.]]Google ScholarGoogle Scholar
  15. Kipper, G. Investigator's Guide to Steganography. CRC Press. Boca Raton, Florida. 2004.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. 16ado, R. EzStego, Stego Online. Website: http://www.stego.com]]Google ScholarGoogle Scholar
  17. Maroney, C. Hide and Seek. (1999) Website: http://www.packetstormsecurity.org/crypt/stego/hideseek/]]Google ScholarGoogle Scholar
  18. Provos, N. "Defending Against Statistical Steganalysis." Proceedings of the 10<sup>th</sup> USENIX Security Symposium. Washington, DC. August 13--17, 2001.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Provos, N. "Steganography Detection with Stegdetect." Website: http://www.outguess.org/detection.php]]Google ScholarGoogle Scholar
  20. Provos, N. OutGuess Download Page. Website: http://www.outguess.org/download.php]]Google ScholarGoogle Scholar
  21. Richer, P., "Steganalysis: Detecting hidden information with computer forensic analysis." SANS/GIAC Practical Assignment for GSEC Certification, SANS Institute 2003.]]Google ScholarGoogle Scholar
  22. Steganography Analysis and Research Center. Website: http://www.22-wv.com/stegalyzerss.aspx]]Google ScholarGoogle Scholar
  23. Saha, Subhasis. "Image Compression - from DCT to Wavelets: A Review." ACM Crossroads 6.3, Data Compression, Spring 2000.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. School of Informatics, The University of Edinburgh, UK. "Graphics file format." (1997). Website: http://www.dcs.ed.ac.uk/home/mxr/gfx]]Google ScholarGoogle Scholar
  25. The Sonic Spot. (2006) Website: http://www.sonicspot.com/guide/wavefiles.html]]Google ScholarGoogle Scholar
  26. Sun Microsystems, Inc. (2001) "Java Image I/O API Guide." Website: http://java.sun.com/j2se/l.4.2/docs/guide/imageio/spec/imageio_guideTOC.fm.html.]]Google ScholarGoogle Scholar
  27. Wayner, P. Disappearing Cryptography. Information Hiding: Steganography &amp; Watermarking. 2<sup>nd</sup> Ed. Morgan Kaufmann Publishers. San Francisco, CA. 2002.]] Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Steganography obliterator: an attack on the least significant bits

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Other conferences
        InfoSecCD '06: Proceedings of the 3rd annual conference on Information security curriculum development
        September 2006
        206 pages
        ISBN:1595934375
        DOI:10.1145/1231047

        Copyright © 2006 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 22 September 2006

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • Article

        Acceptance Rates

        Overall Acceptance Rate18of23submissions,78%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader