Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×
Security

Secret Data: Steganography v Steganalysis 280

gManZboy writes "Two researchers in China has taken a look at the steganography vs. steganalysis arms race. Steganography (hiding data) has drawn more attention recently, as those concerned about information security have recognized that illicit use of the technique might become a threat (to companies or even states). Researchers have thus increased study of steganalysis, the detection of embedded information."
This discussion has been archived. No new comments can be posted.

Secret Data: Steganography v Steganalysis

Comments Filter:
  • Re:Hmm (Score:1, Informative)

    by EasyComputer ( 797633 ) on Friday February 04, 2005 @02:26PM (#11574422)
    http://www.jjtc.com/Steganalysis/ [jjtc.com] ----------------------Good Link on Steganalysis, with some examples of information hidden in pictures.
  • by Sara Chan ( 138144 ) on Friday February 04, 2005 @02:44PM (#11574623)
    From the conclusion of TFA:
    ... countermeasures against steganalysis are also emerging [11].
    Reference [11] is for the F5 algorithm:
    11. Westfeld A. (2001), "F5-Steganographic algorithm: High capacity despite better steganalysis",
    Lecture Notes in Computer Science 2137 289-302 (Springer-Verlag).
    Yet consider this paper:
    Fridrich J., Goljan M., Hogea D. (2002), "
    Steganalysis of JPEG Images: Breaking the F5 Algorithm [binghamton.edu]", 5th Information Hiding Workshop 310-323 (Noordwijkerhout, The Netherlands).
    The abstract from Fridrich et al. says "... we present a steganalytic method that can reliably detect messages ... hidden in JPEG images using the steganographic algorithm F5".

    So TFA article cites countermeasures from 2001, even though a method of defeating those countermeasures was published in 2002.

    The above is just one example. Overall, TFA seems poor and out-of-date. This is a case where the F in "TFA" does not stand for "fine".

  • by Darth_brooks ( 180756 ) <[clipper377] [at] [gmail.com]> on Friday February 04, 2005 @03:02PM (#11574820) Homepage
    There's some truth to the idea of a hidden message in comic strips.

    During the 50's and 60's the air force used a particular comic strip ("smokey stover" i think. http://www.toonopedia.com/smokey.htm [toonopedia.com], also the origin of "foo" and "foo fighter") to train recon. photo interpreters. The artist would hide his wife's name somewhere in every strip, and the new recruits would have to find it.
  • by ediron2 ( 246908 ) * on Friday February 04, 2005 @03:15PM (#11574982) Journal
    IANBS (I Am Not Bruce Schneier), but Strong Encryption beats steg plus encryption, based on my (limited, but relevant) practical experience.

    That runs counterintuitive, so let me scratch the why/how:

    Steg: it's incredibly hard to really hide stuff. If you stick data into the unimportant pixelbits of A/V data, statistical analysis of the sort of data that is created by the source (camera, scanner, etc) makes it *trivial* to detect that stuff is being hidden. The better you hide it, the more you sacrifice signal to noise.

    Steg plus encryption: easily detected, and steg limits the data pipe. If you have a lot of steg data, creating enough host data to mask it becomes a huge damn PITA.

    Strong encryption: data compresses, not expands. Detection and break costs can be reasonably calculated, and algorithms can be picked that achieve an acceptable break cost. And there are mechanisms like dvd-length one-time pads that can make the data flow utterly unassailable as long as it remains encrypted. All that you're left with is attacks outside that space (bribery, extortion, threats, wiretaps, and so on become the cheapest win).

    Incidentally, W.A.S.T.E. has an design aspect that does a great job of balancing steg and encryption: encrypt everything with an algorithm that is computationally expensive to brute-force, then shove copious amounts of probably-not-significant data down the encrypted channel. It's like the shortwave number-reader frequencies: by creating a perpetual, huge stream of junk code, you get rid of the above-mentioned weaknesses, and gain the advantage of creating an encrypted and steg'd stream.

  • Re:Hmm (Score:5, Informative)

    by bentcd ( 690786 ) <bcd@pvv.org> on Friday February 04, 2005 @03:23PM (#11575078) Homepage
    Steganography is typically used within a closed group. It is typically not used between strangers. Therefore, you don't need to publicize your steganographic protocols beyond a small group of people.
    Furthermore, if you take the trouble to hide your data with steganography chances are that you will also encrypt it. In this scenario, the two accomplish different goals. Steganography ensures that no-one realizes that you have communicated at all and cryptography ensures that even if the steganography is compromised, they cannot tell what it was you were sending.
    Steganography is gold to any mole in need of transmitting information from inside a hostile organization to his people on the outside. So long as the hostile org cannot tell that he is communicating, he is safe. Once they figure out, he is busted.
    Or for anyone transmitting information across an untrusted medium for that matter. If you use PGP to protect your Internet mail, the Feds are going to know that you have _something_ going on and that they might want to keep extra tabs on you. If you also use steganographic techniques, you'll never show up on their radar in the first place.
  • by Kjella ( 173770 ) on Friday February 04, 2005 @03:27PM (#11575121) Homepage
    There's a good story on something vaugely related that has to do with the frequency of digits in measured numbers. (That is, it isn't equally probable to see every digit -- earlier digits in a number favor lower digits, like "1".) People who were falsifying accounting records were caught because the numbers they used were "too random".

    Actually, here the fault is that they didn't understood the target. Expenses have no "natural" size, they're likely to be scale invariant. Basicly, you're looking for a distribution where C*f(x) = f(x). If you took 1..9, try C=2: 2,4,6,8,10,12,14,16,18... suddenly you have 5 leading 1s.

    Turns out the right distribution is following Benford's law:

    30.1% 17.6% 12.5% 9.7% 7.9% 6.7% 5.8% 5.1% 4.6%

    The second example you have is that the human "RNG" is flawed.

    A computer doesn't really suffer from this problem. The stenagography problem is really this.

    1. Find randomness in source data
    2. Replace random data with pseudorandom data

    Of course, if you overwrite non-random data, you're doing it wrong. If you're going to use the LSB, you need to verfiy that it is random, or find the portion of it that is random (which is kinda what you're doing when you pick the LSB from a pixel anyway).

    The biggest problem is really to hide it in a "reasonable" way.

    Perfect steganography should replace all randomness with noise.

    Perfect compression should eliminate all randomness.

    In other words, steganography operates on the thin slice between good compression (jpg, mp3, divx) and perfect compression. It's much easier to hide information in bmp, wav, uncompressed avi, but it also looks damn obvious.

    Kjella
  • by Minna Kirai ( 624281 ) on Friday February 04, 2005 @04:14PM (#11575674)
    IANBS (I Am Not Bruce Schneier), but Strong Encryption beats steg plus encryption, based on my (limited, but relevant) practical experience.

    They shouldn't be directly compared, because steganography and encryption reach towards different goals. One conceals the fact that you're hiding information, the other protects information from someone who already knows to look for it.

    In limited circumstances, each can perform the other's effect: steganography makes encryption irrelevant if they can't find the material, and encryption makes steganograph irrelevant if and only if a substantial portion of non-suspected people are also using encryption for daily correspondence.

    There are governments today, however, that will rape you with a machinegun if they see you passing coded messages around, so steganography has immediate utility.
  • Detection? (Score:3, Informative)

    by NerveGas ( 168686 ) on Friday February 04, 2005 @04:33PM (#11575864)

    You'll have to forgive me, I'm not the greatest cryptographer in the world. But let's say that Joe Shmoe takes a picture with his cheap 8-megapixel camera, with a very high ISO setting for lots of noise. Now, that's roughly 192 megabits of information.

    Suppose he needs to encode a 1 kilobit message. that means that there's going to be one bit of signal for every 192 kilobits of image. Now, say he does the encoding to merely appear like more noise in the already noisy image.

    Given that low of a signal-to-noise ratio, I really don't see how you could detect the message unless you had prior knowledge of the algorithm or locations.

    steve
  • by Anonymous Coward on Friday February 04, 2005 @04:41PM (#11575965)
    It was Al Hirshfeld, and the hidden name was that of his daughter, Nina.
  • by Abcd1234 ( 188840 ) on Friday February 04, 2005 @07:49PM (#11578299) Homepage
    also eliminate (some) randomness.

    No, you eliminate some redundancy, thus *increasing* the randomness. The whole point is, with compression, if your output is less than perfectly random, then you must be able to compress more, as there are additional patterns that can be eliminated. Or, at least that was my understanding. :)

    In support of this is fact that you can't compress a perfectly random data stream. Why? Because there is no redundancy to eliminate. And a perfect compression algorithm should output data which isn't further compressible... meaning it's indistinguishable from perfectly random noise.

2.4 statute miles of surgical tubing at Yale U. = 1 I.V.League

Working...