skip to main content
article
Free Access

Cyber warfare: steganography vs. steganalysis

Published:01 October 2004Publication History
Skip Abstract Section

Abstract

For every clever method and tool being developed to hide information in multimedia data, an equal number of clever methods and tools are being developed to detect and reveal its secrets.

References

  1. Berghel, H. and O'Gorman, L. Protecting ownership rights through digital watermarks. IEEE Comput. 29, 7 (July 1996), 101--103. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Chen, B. and Wornell, G. Quantization index modulation: A class of provably good methods for watermarking and information embedding. IEEE Transact. Info. Theory 47, 4 (May 2001), 1423--1443. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Fridrich, J. and Goljan, M. Practical steganalysis of digital images: State of the art. In Proceedings of SPIE, Security and Watermarking Multimedia Contents IV (San Jose, CA, Jan. 21--24). International Society for Optical Engineering, 2002, 1--13.Google ScholarGoogle ScholarCross RefCross Ref
  4. Johnson, N. and Jajodia, S. Exploring steganography: Seeing the unseen. IEEE Comput. 31, 2 (Feb. 1998), 26--34. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Katzenbeisser, S. and Petitcolas, F. Defining security in steganographic systems. In Proceedings of SPIE, Security and Watermarking of Multimedia Contents IV (San Jose, CA, Jan 21--24). International Society for Optical Engineering, 2002, 50--56.Google ScholarGoogle Scholar
  6. Kovacich, G. and Jones, A. What infosec professionals should know about information warfare tactics by terrorists (Parts 1 and 2). Comput. & Sec. 21, 1 (Jan. 2002), 35--41; 21, 2 (Mar. 2002), 113--119.Google ScholarGoogle Scholar
  7. Marvel, L., Boncelet, C., Jr., and Retter, C. Spread-spectrum image steganography. IEEE Transact. Image Process. 8, 8 (Aug. 1999), 1075--1083. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Memon, N. and Wong, P. Protecting digital media content. Commun. ACM 41, 7 (July 1998), 34--43. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Moskowitz, I., Longdon, G., and Chang, L. A new paradigm hidden in steganography. In Proceedings of the 2000 Workshop on New Security Paradigms (Ballycotton, County Cork, Ireland, Sept. 18--21). ACM Press, New York, 2000, 41--50. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Provos, N. and Honeyman, P. Detecting steganographic content on the Internet. In Proceedings of Network and Distributed System Security Symposium (San Diego, Feb. 6--8). Internet Society, Reston, VA, 2002.Google ScholarGoogle Scholar
  11. Westfeld, A. F5-Steganographic algorithm: High capacity despite better steganalysis. In Lecture Notes in Computer Science 2137. Springer-Verlag, Berlin, 2001, 289--302. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Westfeld, A. Detecting low embedding rates. In Lecture Notes in Computer Science 2137. Springer-Verlag, Berlin, 2003, 324--339. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Cyber warfare: steganography vs. steganalysis

            Recommendations

            Reviews

            Jeanine M. Meyer

            Methods of steganography, hiding information within images, and steganalysis, detecting the presence of hidden messages within images, are described in this article. The authors compare and contrast two forms of steganography, focusing mainly on techniques for transmitting secret messages, but also addressing applications such as watermarking, when the fact that there is hidden content does not need to be concealed, but it is necessary to make sure that the hidden content is not destroyed or affected by manipulations, such as compression techniques. For steganalysis, note that the focus is only on detection. The task of interpreting the content falls in the domain of cryptography. Visual and statistical methods are discussed. The authors suggest that there is an ongoing battle, a cyber-war, between those who would hide information, and those who need to detect and stop the practice. No specific instances of the use of these techniques are mentioned. The article is excellent at providing general descriptions of approaches; listing available tools, with sources, for steganography and current methods for steganalysis; and providing references. However, there is little explanation in sufficient depth for someone unfamiliar with this topic to gain understanding. Even for least-significant-bit modification, the discussion of an example shown with a figure is not clear. The layout of the article, specifically the compressed tables and figures, does not serve its readers well. Online Computing Reviews Service

            Access critical reviews of Computing literature here

            Become a reviewer for Computing Reviews.

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in

            Full Access

            • Published in

              cover image Communications of the ACM
              Communications of the ACM  Volume 47, Issue 10
              Voting systems
              October 2004
              95 pages
              ISSN:0001-0782
              EISSN:1557-7317
              DOI:10.1145/1022594
              Issue’s Table of Contents

              Copyright © 2004 ACM

              Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

              Publisher

              Association for Computing Machinery

              New York, NY, United States

              Publication History

              • Published: 1 October 2004

              Permissions

              Request permissions about this article.

              Request Permissions

              Check for updates

              Qualifiers

              • article

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader

            HTML Format

            View this article in HTML Format .

            View HTML Format