Abstract
Steganography is often combined with cryptographic mechanisms. This enhances steganography by valuable properties that are originally left to cryptographic systems.
However, new problems for cryptographic mechanisms arise from the context of steganography. There are two sorts of steganographic tools: commercial tools with insecure or badly implemented cryptography and academic proof-of-concepts that abstain from the actual implementation of the cryptographic part.
Comparably to cryptography, steganography evolves in an iterative process of designing and breaking new methods. In this paper we examine the encoding properties and cryptographic functionality of steganographic tools to enable the detection of embedded information in steganograms even if the embedding part was otherwise secure.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Johnson, N.F.: Steganography tools (2002), Online available at: http://www.jjtc.com/Security/stegtools.htm
Johnson, N.F.: Steganography and digital watermarking tool table (2003), Online available at: http://www.jjtc.com/Steganography/toolmatrix.htm
Petitcolas, F.A.P.: Steganographic software (2005), Online available at: http://www.petitcolas.net/fabien/steganography/stego_soft.html
Kerckhoffs, A.: La cryptographie militaire. Journal des sciences militaires IX, 5–38, 161–191 (1883) Online available at: http://www.petitcolas.net/fabien/kerckhoffs/crypto_militaire_1.pdf
Collomosse, J.: Blindside (2000), Online available at: http://www.blindside.co.uk
Cotting, D.: Stegano (2000), Online available at: http://registry.gimp.org/plugin?id=314
Thijssen, J., Zimmerman, H.: Contraband (1998), Online available at: http://www.xs4all.nl/~jult/4u/contrabd.exe
Collin, F.D.: EncryptPic (2000), Online available at: ftp://ftp.elet.polimi.it/mirror/Winsite/win95/miscutil/encpic13.exe
Nelson, L.: Gif it up (2004), Online available at: http://digitalforensics.champlain.edu/download/Gif-it-up.exe
Iceman81: Steggy (2003), Online available at: http://mesh.dl.sourceforge.net/sourceforge/steggy/steggy0.1rc1.tar.gz
Upham, D.: Jsteg (2000), Online available at 0urls.txt: http://munitions.vipul.net/software/steganography/jpeg-jsteg-v4.diff.gz
Platt, C.: Ump3c (2004), Online available at: http://mesh.dl.sourceforge.net/sourceforge/ump3c/UnderMP3Cover-1.1.tar.gz
Bauer, M.: AppendX (2003), Online available at: http://www.unet.univie.ac.at/~a9900470/appendX/apX
Neobyte Solutions: Invisible (2000), Online available at: http://www.neobytesolutions.com/downloads/invsecr.zip
Zaretskiy, E.: Masker (2001), Online available at: http://www.softpuls.com/masker/
HappyCactus: Pngstego (2003), Online available at: http://mesh.dl.sourceforge.net/sourceforge/pngstego/pngstego-0.3.2.tar.gz
Petitcolas, F.A.P.: MP3Stego (2001), Online available at: http://packetstorm.trustica.cz/crypt/stego/SourceCode/MP3Stego_1.0.14b1_src.tar.gz
Hacktivismo: Camera/Shy (2002), Online available at: http://mesh.dl.sourceforge.net/sourceforge/camerashy/CameraShy.0.2.23.1.exe
Westfeld, A., Kellermann, B.: Detection utilities (2005), Online available at: http://dud.inf.tu-dresden.de/~westfeld/detectors/
Zhang, T., Ping, X.: A fast and effective steganalytic technique against JSteg-like algorithms. In: Proc. of the 2003 ACM Symposium on Applied Computing, Melbourne, Florida, pp. 307–311 (2003)
Lee, K., Westfeld, A., Lee, S.-J.: Category attack for LSB steganalysis of JPEG images. In: Shi, Y.Q., Jeon, B. (eds.) IWDW 2006. LNCS, vol. 4283, pp. 35–48. Springer, Heidelberg (2006)
University of Washington: CBIR image database (2004), Online available at: http://www.cs.washington.edu/research/imagedatabase/groundtruth
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Westfeld, A. (2006). Steganalysis in the Presence of Weak Cryptography and Encoding. In: Shi, Y.Q., Jeon, B. (eds) Digital Watermarking. IWDW 2006. Lecture Notes in Computer Science, vol 4283. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11922841_3
Download citation
DOI: https://doi.org/10.1007/11922841_3
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-48825-5
Online ISBN: 978-3-540-48827-9
eBook Packages: Computer ScienceComputer Science (R0)