Abstract
Steganography is the art of passing information in a manner that the very existence of the message is unknown. The goal of steganography is to avoid drawing suspicion to the transmission of a hidden message. If suspicion is raised, then this goal is defeated. Steganalysis is the art of discovering and rendering useless such covert messages. In this paper, we identify characteristics in current steganography software that direct the steganalyst to the existence of a hidden message and introduce the ground work of a tool for automatically detecting the existence of hidden messages in images.
Keywords
- Discrete Cosine Transform
- Cover Image
- Watermark Image
- Digital Watermark
- Discrete Cosine Transform Coefficient
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Anderson, R., (ed.): Information hiding: first international workshop, Cambridge, UK. Lecture Notes in Computer Science, Vol. 1174. Springer-Verlag, Berlin Heidelberg New York (1996)
Anderson, R., Petitcolas, F.: On the Limits of Steganography, IEEE Journal on Selected Areas in Communications, Vol. 16, No. 4, May (1998) 474–481.
Aura, T.: Invisible Communication, EET 1995. Technical Report, Helsinki Univ. of Technology, Finland, November 1995, http://www.deadlock.hut.fi/ste/stefihtml (1995)
Bender, W., Gruhl, D., Morimoto, N., Lu, A.: Techniques for Data Hiding. IBM Systems Journal Vol. 35, No. 3&4. MIT Media Lab (1996) 313–336.
Brown, W., Shepherd, B.J.: Graphics File Formats: Reference and Guide. Manning Publications, Greenwich, CT (1995)
Cox, I., Kilian, J., Leighton, T., Shamoon, T.: Secure Spread Spectrum Watermarking for Multimedia. Technical Report 95-10, NEC Research Institute (1995)
Cox, I., Kilian, J., Shamoon, T., Leighton, T.: A Secure, Robust Watermark for Multimedia. In: [1] (1996) 185–206
Cole, E.: Steganography. Information System Security paper, George Mason University. (1997)
Craver, S., Memon, N., Yeo, B., Yeung, N.M.: Resolving Rightful Ownerships with Invisible Watermarking Techniques. Research Report RC 20755 (91985), Computer Science/ Mathematics, IBM Research Division (1997)
Cha, S.D., Park, G.H., Lee, H.K.: A Solution to the Image Downgrading Problem. ACSAC (1995) 108–112
Dunigan, T.: Work in progress on Internet steganography which involves hiding, recovering, and detecting info hidden in the TCP/IP packet headers. Oak Ridge National Laboratory, Oak Ridge, TN.
Gonzalez, R.C., Woods, R.E.: Digital Image Processing. Addison-Wesley. Reading, MA, (1992)
Heckbert, P.: Color Image Quantization for Frame Buffer Display. ACM Computer Graphics, vol. 16, no. 3. July (1982) 297–307.
Johnson, N.F., Jajodia, S.: Exploring Steganography: Seeing the Unseen. IEEE Computer. February (1998) 26–34
Johnson, N.F.: Steganography. Information System Security paper, George Mason University (1995) http://www.isse.gmu.edu/~njohnson/stegdoc/
Koch, E., Rindfrey, J., Zhao, J.: Copyright Protection for Multimedia Data. Proceedings of the International Conference on Digital Media and Electronic Publishing, December 1994. Leeds, UK (1994)
Kurak, C., McHugh, J.: A Cautionary Note On Image Downgrading. IEEE Eighth Annual Computer Security Applications Conference (1992) 153–159.
Petitcolas, F., Anderson, R., Kuhn, M.: Attacks on Copyright Marking Systems. Second Workshop on Information Hiding, Portland, Oregon, April. This proceedings (1998)
Pfitzman, B.: Information Hiding Terminology. In: [1] 347–350
Wayner, P.: Disappearing Cryptography. AP Professional, Chestnut Hill, MA (1996)
Xia, X, Boncelet, C.G., Arce, G.R.: A Multiresolution Watermark for Digital Images. IEEE International Conference on Image Processing, October 1997 (1997)
Anonymous, Author alias: Black Wolf.: StegoDos-Black Wolf’s Picture Encoder v0.90B, Public Domain. ftp://ftp.csua.berkeley.edu/pub/cypherpunks/steganography/stegodos.zip..
Arachelian, R.: White Noise Stormℳ (WNS), Shareware (1994) ftp://ftp.csua.berkeley.edu/pub/cypherpunks/steganography/wns210.zip.
Brown, A.: S-Tools for Windows, Shareware 1994. ftp://ftp.idea.sec.dsi.unimi.it/pub/security/crypt/code/s-tools3.zip (version 3), ftp://idea.sec.dsi.unimi.it/pub/security/crypt/code/s-tools4.zip (version 4)
Hastur, H: Mandelsteg, ftp://ftp.idea.sec.dsi.unimi.it/pub/security/crypt/code/
Machado, R.: EzStego, Stego Online, Stego, http://www.stego.com
Maroney, C.: Hide and Seek, Shareware. ftp://ftp.csua.berkeley.edu/pub/cypherpunks/steganography/hdsk41b.zip (version 4.1), http://www.rugeley.demon.co.uk/security/hdsk50.zip (version 5.0),http://www.cypher.net/products/ (version 1.0 for Windows 95)
Repp, H.: Hide4PGP, http://www.rugeley.demon.co.uk/security/hide4pgp.zip
Hansmann F.: Steganos. Deus Ex Machina Communications. http://www.steganography.com
Digimarc Corporation: PictureMarcℳ, MarcSpiderℳ, http://www.digimarc.com
Kutter, M., Jordan, F.: JK-PGS (Pretty Good Signature). Signal Processing Laboratory at Swiss Federal Institute of Technology (EPFL). http://www.epfl.ch/~kutter/watermarking/JK_PGS.html
MediaSec Technologies LLC.: SysCopℳ, http://www.mediasec.com/
Signum Technologies, SureSign, http://www.signumtech.com
Upham, D.: Jpeg-Jsteg. Modification of the Independent JPEG Group’s JPEG software (release 4) for 1-bit steganography in JFIF output files. ftp://ftp.funet.fi/pub/crypt/ steganography.
Kuhn, M., Petitcolas F.: StirMark. http://www.cl.cam.ac.uk/~fapp2/watermarking/stirmark/(1997)
Sanders, D.: Stegodetect. Steganography detection tool (1997)
Anonymous: unZign. Watermarking testing tool available at http://www.altern.org/watermark/ - the author may be contacted through unzign@hotmail.com (1997)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1998 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Johnson, N.F., Jajodia, S. (1998). Steganalysis of Images Created Using Current Steganography Software. In: Aucsmith, D. (eds) Information Hiding. IH 1998. Lecture Notes in Computer Science, vol 1525. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-49380-8_19
Download citation
DOI: https://doi.org/10.1007/3-540-49380-8_19
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-65386-8
Online ISBN: 978-3-540-49380-8
eBook Packages: Springer Book Archive