Skip to main content

Steganalysis in the Presence of Weak Cryptography and Encoding

  • Conference paper
Digital Watermarking (IWDW 2006)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 4283))

Included in the following conference series:

Abstract

Steganography is often combined with cryptographic mechanisms. This enhances steganography by valuable properties that are originally left to cryptographic systems.

However, new problems for cryptographic mechanisms arise from the context of steganography. There are two sorts of steganographic tools: commercial tools with insecure or badly implemented cryptography and academic proof-of-concepts that abstain from the actual implementation of the cryptographic part.

Comparably to cryptography, steganography evolves in an iterative process of designing and breaking new methods. In this paper we examine the encoding properties and cryptographic functionality of steganographic tools to enable the detection of embedded information in steganograms even if the embedding part was otherwise secure.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Johnson, N.F.: Steganography tools (2002), Online available at: http://www.jjtc.com/Security/stegtools.htm

  2. Johnson, N.F.: Steganography and digital watermarking tool table (2003), Online available at: http://www.jjtc.com/Steganography/toolmatrix.htm

  3. Petitcolas, F.A.P.: Steganographic software (2005), Online available at: http://www.petitcolas.net/fabien/steganography/stego_soft.html

  4. Kerckhoffs, A.: La cryptographie militaire. Journal des sciences militaires IX, 5–38, 161–191 (1883) Online available at: http://www.petitcolas.net/fabien/kerckhoffs/crypto_militaire_1.pdf

  5. Collomosse, J.: Blindside (2000), Online available at: http://www.blindside.co.uk

  6. Cotting, D.: Stegano (2000), Online available at: http://registry.gimp.org/plugin?id=314

  7. Thijssen, J., Zimmerman, H.: Contraband (1998), Online available at: http://www.xs4all.nl/~jult/4u/contrabd.exe

  8. Collin, F.D.: EncryptPic (2000), Online available at: ftp://ftp.elet.polimi.it/mirror/Winsite/win95/miscutil/encpic13.exe

  9. Nelson, L.: Gif it up (2004), Online available at: http://digitalforensics.champlain.edu/download/Gif-it-up.exe

  10. Iceman81: Steggy (2003), Online available at: http://mesh.dl.sourceforge.net/sourceforge/steggy/steggy0.1rc1.tar.gz

  11. Upham, D.: Jsteg (2000), Online available at 0urls.txt: http://munitions.vipul.net/software/steganography/jpeg-jsteg-v4.diff.gz

  12. Platt, C.: Ump3c (2004), Online available at: http://mesh.dl.sourceforge.net/sourceforge/ump3c/UnderMP3Cover-1.1.tar.gz

  13. Bauer, M.: AppendX (2003), Online available at: http://www.unet.univie.ac.at/~a9900470/appendX/apX

  14. Neobyte Solutions: Invisible (2000), Online available at: http://www.neobytesolutions.com/downloads/invsecr.zip

  15. Zaretskiy, E.: Masker (2001), Online available at: http://www.softpuls.com/masker/

  16. HappyCactus: Pngstego (2003), Online available at: http://mesh.dl.sourceforge.net/sourceforge/pngstego/pngstego-0.3.2.tar.gz

  17. Petitcolas, F.A.P.: MP3Stego (2001), Online available at: http://packetstorm.trustica.cz/crypt/stego/SourceCode/MP3Stego_1.0.14b1_src.tar.gz

  18. Hacktivismo: Camera/Shy (2002), Online available at: http://mesh.dl.sourceforge.net/sourceforge/camerashy/CameraShy.0.2.23.1.exe

  19. Westfeld, A., Kellermann, B.: Detection utilities (2005), Online available at: http://dud.inf.tu-dresden.de/~westfeld/detectors/

  20. Zhang, T., Ping, X.: A fast and effective steganalytic technique against JSteg-like algorithms. In: Proc. of the 2003 ACM Symposium on Applied Computing, Melbourne, Florida, pp. 307–311 (2003)

    Google Scholar 

  21. Lee, K., Westfeld, A., Lee, S.-J.: Category attack for LSB steganalysis of JPEG images. In: Shi, Y.Q., Jeon, B. (eds.) IWDW 2006. LNCS, vol. 4283, pp. 35–48. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  22. University of Washington: CBIR image database (2004), Online available at: http://www.cs.washington.edu/research/imagedatabase/groundtruth

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Westfeld, A. (2006). Steganalysis in the Presence of Weak Cryptography and Encoding. In: Shi, Y.Q., Jeon, B. (eds) Digital Watermarking. IWDW 2006. Lecture Notes in Computer Science, vol 4283. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11922841_3

Download citation

  • DOI: https://doi.org/10.1007/11922841_3

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-48825-5

  • Online ISBN: 978-3-540-48827-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics