Skip to main content

Steganalysis of Images Created Using Current Steganography Software

  • Conference paper
  • First Online:
Information Hiding (IH 1998)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1525))

Included in the following conference series:

Abstract

Steganography is the art of passing information in a manner that the very existence of the message is unknown. The goal of steganography is to avoid drawing suspicion to the transmission of a hidden message. If suspicion is raised, then this goal is defeated. Steganalysis is the art of discovering and rendering useless such covert messages. In this paper, we identify characteristics in current steganography software that direct the steganalyst to the existence of a hidden message and introduce the ground work of a tool for automatically detecting the existence of hidden messages in images.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Anderson, R., (ed.): Information hiding: first international workshop, Cambridge, UK. Lecture Notes in Computer Science, Vol. 1174. Springer-Verlag, Berlin Heidelberg New York (1996)

    Google Scholar 

  2. Anderson, R., Petitcolas, F.: On the Limits of Steganography, IEEE Journal on Selected Areas in Communications, Vol. 16, No. 4, May (1998) 474–481.

    Article  Google Scholar 

  3. Aura, T.: Invisible Communication, EET 1995. Technical Report, Helsinki Univ. of Technology, Finland, November 1995, http://www.deadlock.hut.fi/ste/stefihtml (1995)

    Google Scholar 

  4. Bender, W., Gruhl, D., Morimoto, N., Lu, A.: Techniques for Data Hiding. IBM Systems Journal Vol. 35, No. 3&4. MIT Media Lab (1996) 313–336.

    Article  Google Scholar 

  5. Brown, W., Shepherd, B.J.: Graphics File Formats: Reference and Guide. Manning Publications, Greenwich, CT (1995)

    Google Scholar 

  6. Cox, I., Kilian, J., Leighton, T., Shamoon, T.: Secure Spread Spectrum Watermarking for Multimedia. Technical Report 95-10, NEC Research Institute (1995)

    Google Scholar 

  7. Cox, I., Kilian, J., Shamoon, T., Leighton, T.: A Secure, Robust Watermark for Multimedia. In: [1] (1996) 185–206

    Google Scholar 

  8. Cole, E.: Steganography. Information System Security paper, George Mason University. (1997)

    Google Scholar 

  9. Craver, S., Memon, N., Yeo, B., Yeung, N.M.: Resolving Rightful Ownerships with Invisible Watermarking Techniques. Research Report RC 20755 (91985), Computer Science/ Mathematics, IBM Research Division (1997)

    Google Scholar 

  10. Cha, S.D., Park, G.H., Lee, H.K.: A Solution to the Image Downgrading Problem. ACSAC (1995) 108–112

    Google Scholar 

  11. Dunigan, T.: Work in progress on Internet steganography which involves hiding, recovering, and detecting info hidden in the TCP/IP packet headers. Oak Ridge National Laboratory, Oak Ridge, TN.

    Google Scholar 

  12. Gonzalez, R.C., Woods, R.E.: Digital Image Processing. Addison-Wesley. Reading, MA, (1992)

    Google Scholar 

  13. Heckbert, P.: Color Image Quantization for Frame Buffer Display. ACM Computer Graphics, vol. 16, no. 3. July (1982) 297–307.

    Article  Google Scholar 

  14. Johnson, N.F., Jajodia, S.: Exploring Steganography: Seeing the Unseen. IEEE Computer. February (1998) 26–34

    Google Scholar 

  15. Johnson, N.F.: Steganography. Information System Security paper, George Mason University (1995) http://www.isse.gmu.edu/~njohnson/stegdoc/

  16. Koch, E., Rindfrey, J., Zhao, J.: Copyright Protection for Multimedia Data. Proceedings of the International Conference on Digital Media and Electronic Publishing, December 1994. Leeds, UK (1994)

    Google Scholar 

  17. Kurak, C., McHugh, J.: A Cautionary Note On Image Downgrading. IEEE Eighth Annual Computer Security Applications Conference (1992) 153–159.

    Google Scholar 

  18. Petitcolas, F., Anderson, R., Kuhn, M.: Attacks on Copyright Marking Systems. Second Workshop on Information Hiding, Portland, Oregon, April. This proceedings (1998)

    Google Scholar 

  19. Pfitzman, B.: Information Hiding Terminology. In: [1] 347–350

    Google Scholar 

  20. Wayner, P.: Disappearing Cryptography. AP Professional, Chestnut Hill, MA (1996)

    Google Scholar 

  21. Xia, X, Boncelet, C.G., Arce, G.R.: A Multiresolution Watermark for Digital Images. IEEE International Conference on Image Processing, October 1997 (1997)

    Google Scholar 

  22. Anonymous, Author alias: Black Wolf.: StegoDos-Black Wolf’s Picture Encoder v0.90B, Public Domain. ftp://ftp.csua.berkeley.edu/pub/cypherpunks/steganography/stegodos.zip..

  23. Arachelian, R.: White Noise Stormℳ (WNS), Shareware (1994) ftp://ftp.csua.berkeley.edu/pub/cypherpunks/steganography/wns210.zip.

  24. Brown, A.: S-Tools for Windows, Shareware 1994. ftp://ftp.idea.sec.dsi.unimi.it/pub/security/crypt/code/s-tools3.zip (version 3), ftp://idea.sec.dsi.unimi.it/pub/security/crypt/code/s-tools4.zip (version 4)

  25. Hastur, H: Mandelsteg, ftp://ftp.idea.sec.dsi.unimi.it/pub/security/crypt/code/

  26. Machado, R.: EzStego, Stego Online, Stego, http://www.stego.com

  27. Maroney, C.: Hide and Seek, Shareware. ftp://ftp.csua.berkeley.edu/pub/cypherpunks/steganography/hdsk41b.zip (version 4.1), http://www.rugeley.demon.co.uk/security/hdsk50.zip (version 5.0),http://www.cypher.net/products/ (version 1.0 for Windows 95)

  28. Repp, H.: Hide4PGP, http://www.rugeley.demon.co.uk/security/hide4pgp.zip

  29. Hansmann F.: Steganos. Deus Ex Machina Communications. http://www.steganography.com

  30. Digimarc Corporation: PictureMarcℳ, MarcSpiderℳ, http://www.digimarc.com

  31. Kutter, M., Jordan, F.: JK-PGS (Pretty Good Signature). Signal Processing Laboratory at Swiss Federal Institute of Technology (EPFL). http://www.epfl.ch/~kutter/watermarking/JK_PGS.html

  32. MediaSec Technologies LLC.: SysCopℳ, http://www.mediasec.com/

  33. Signum Technologies, SureSign, http://www.signumtech.com

  34. Upham, D.: Jpeg-Jsteg. Modification of the Independent JPEG Group’s JPEG software (release 4) for 1-bit steganography in JFIF output files. ftp://ftp.funet.fi/pub/crypt/ steganography.

  35. Kuhn, M., Petitcolas F.: StirMark. http://www.cl.cam.ac.uk/~fapp2/watermarking/stirmark/(1997)

  36. Sanders, D.: Stegodetect. Steganography detection tool (1997)

    Google Scholar 

  37. Anonymous: unZign. Watermarking testing tool available at http://www.altern.org/watermark/ - the author may be contacted through unzign@hotmail.com (1997)

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 1998 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Johnson, N.F., Jajodia, S. (1998). Steganalysis of Images Created Using Current Steganography Software. In: Aucsmith, D. (eds) Information Hiding. IH 1998. Lecture Notes in Computer Science, vol 1525. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-49380-8_19

Download citation

  • DOI: https://doi.org/10.1007/3-540-49380-8_19

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-65386-8

  • Online ISBN: 978-3-540-49380-8

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics