Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 33122
Integrated Method for Detection of Unknown Steganographic Content
Authors: Magdalena Pejas
Abstract:
This article concerns the presentation of an integrated method for detection of steganographic content embedded by new unknown programs. The method is based on data mining and aggregated hypothesis testing. The article contains the theoretical basics used to deploy the proposed detection system and the description of improvement proposed for the basic system idea. Further main results of experiments and implementation details are collected and described. Finally example results of the tests are presented.Keywords: Steganography, steganalysis, data embedding, data mining, feature extraction, knowledge base, system learning, hypothesis testing, error estimation, black box program, file structure.
Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1332724
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1568References:
[1] Robert N. McDonough and Anthony D. Whalen, Detection of Signal in Noise, Academic Press, 1995.
[2] J. Fridrich, J., Goljan, "Practical Steganalysis of Digital Images - State of the Art", Proceedings of SPIE Photonics West 2002: Electronic Imaging, Security and Watermarking of Multimedia Contents IV, 4675:1-13, 2002.
[3] A. Westfield, A. Pfitzman, "Attacks on Steganographic Systems", Information Hiding, LNCS 1768, pp. 61-76, Springer-Verlag Berlin Heidelberg, 1999.
[4] A. Westfeld and A. Pfitzmann, "Attacks on steganographic systems", 3rd International Workshop on Information Hiding, IH'99 Dresden Germany, October Proceedings, Computer Science 1768. pp. 61- 76, 1999.
[5] A. Westfeld, A., Pfitzmann, A., "Attacks on Steganographic Systems - Breaking the Steganographic Utilities EzStego, Jsteg, Steganos, and STools - and Some Lessons Learned", Lecture Notes in Computer Science, 1768:61-75, 2000.
[6] N. Provos, P. Honeyman , "Detecting Steganography Content on the Internet", CITI technical report, vol. 1, pp. 01-11, August 2001.
[7] R.J. Anderson and F.A.P. Petitcolas, "On the limits of steganography", IEEE Journal of Selected Areas in Communications, Special Issue on Copyright and Privacy Protection, May 1998.
[8] H. Farid, "Detecting Steganographic Message in Digital Images", Report TR2001-412, Dartmouth College, Hanover, NH, 2001.
[9] H. Farid, "Detecting Steganographic Messages in Digital Images", Technical Report, Hanover, NH: Dartmouth College, 2001.
[10] N. F. Johnson and S. Jajodia, "Steganalysis of Images Created Using Current Steganography Software", Lecture Notes in Computer Science, vol.1525, Springer-Verlag, Berlin, 1998, pp. 273 -289.
[11] Magdalena Pejas, "Detecting Steganographic Transmissions", Software Developer's Journal 9/2005.
[12] Magdalena Pejas, "Aggregated Hypothesis Testing for Steganalysis", Transactions on Enformatika, Systems Sciences and Engineering 8 October 2005, 2005 International Academy of Sciences, ISBN 975- 98458-7-3.