Secret Data: Steganography v Steganalysis 280
gManZboy writes "Two researchers in China has taken a look at the steganography vs. steganalysis arms race. Steganography (hiding data) has drawn more attention recently, as those concerned about information security have recognized that illicit use of the technique might become a threat (to companies or even states). Researchers have thus increased study of steganalysis, the detection of embedded information."
Hmm (Score:5, Interesting)
Re:Hmm (Score:3, Interesting)
Or in the case of "The Bible Codes", you find what you want to find.
Re:Hmm (Score:2)
Re:Hmm (Score:2)
it may have been used for some time, but it isn't so common now. recently there's been more focus on encrypting the data, not hiding where it is.
the original poster was saying (AFAIK) that he thought it would be popular again, not popular for the fist time ever.
I think he's right with regards to encrypting data in static, passively observed things like photos. transmitted data will probably use quantum te
Re:Hmm (Score:2, Insightful)
I recall that idea not being very popular with the slashdot crowd.
Re:Hmm (Score:4, Insightful)
Re:Wasn't that his point? MOD PARENT DOWN (Score:5, Interesting)
OK I give up (Score:3, Funny)
Re:Wasn't that his point? MOD PARENT DOWN (Score:5, Funny)
Re:Hmm (Score:5, Insightful)
But your point is really what the article is about. A serious Steganography method must be good enough to pass automated searches (steganalysis) because if the enemy knows where your data is, then you almost might as well have not bothered.
And of course, what the other post said is implied.
Re:Hmm (Score:4, Insightful)
Re:Hmm (Score:4, Insightful)
In other encryption techniques, such as Public Key Encryption, the decryption algorithm is public. The algorithm works like a box with two keyholes. One keyhole locks the box, the other unlocks it. Each person selects two keys, one is public, the other is private. If the sender wants to send a message, she locks the box with the receiver's public key. Once locked, the box can only be opened with the receiver's private key. If the Larry decides to leak his private key, it doesn't compromise the security of messages sent to other people. Heather can still send messages to Jim, using his public key, confident that the messages will remain private because they are encrypted with Jim's public key, not Larry's.
Re:Hmm (Score:5, Informative)
Furthermore, if you take the trouble to hide your data with steganography chances are that you will also encrypt it. In this scenario, the two accomplish different goals. Steganography ensures that no-one realizes that you have communicated at all and cryptography ensures that even if the steganography is compromised, they cannot tell what it was you were sending.
Steganography is gold to any mole in need of transmitting information from inside a hostile organization to his people on the outside. So long as the hostile org cannot tell that he is communicating, he is safe. Once they figure out, he is busted.
Or for anyone transmitting information across an untrusted medium for that matter. If you use PGP to protect your Internet mail, the Feds are going to know that you have _something_ going on and that they might want to keep extra tabs on you. If you also use steganographic techniques, you'll never show up on their radar in the first place.
Re:Hmm (Score:3, Interesting)
If ever they develop the notion that you require extra special treatment, they might catch on to your hidden messages, of course (or perhaps not). If they do, then I agree they have all the more reason to suspect you of foul p
Re:Hmm (Score:3, Insightful)
An alternative t
Re:Hmm (Score:2)
Layered Implementation (Score:3, Insightful)
Re:Layered Implementation (Score:3, Informative)
That runs counterintuitive, so let me scratch the why/how:
Steg: it's incredibly hard to really hide stuff. If you stick data into the unimportant pixelbits of A/V data, statistical analysis of the sort of data that is created by the source (camera, scanner, etc) makes it *trivial* to detect that stuff is being hidden. The better you hide it, the more you sacrifice
Re:Layered Implementation (Score:3, Interesting)
Re:Layered Implementation (Score:3, Informative)
They shouldn't be directly compared, because steganography and encryption reach towards different goals. One conceals the fact that you're hiding information, the other protects information from someone who already knows to look for it.
In limited circumstances, each can perform the other's effect: steganography makes encryption irrelevant if they can't find the mate
Re:Layered Implementation (Score:2)
Exactly. Even if you play the record backwards, no one knows exactly what the hell the message means. Satan wants you to something, but you can only really tell if you have the code book.
TW
Re:Layered Implementation (Score:2)
Its possible to steganographically hide more than one piece of data inside something else.
The cryptographers problem then is a decision problem; even if you find something concealed, do you stop looking for more? When do you stop expending resources?
How do you know that the piece that you found wasn't the data that you were *intended* to find? So that you'd stop looking for more.
Or perhaps there are
Re:Hmm (Score:2)
No. Caesar-cipher looks like "jebsb kysal". Get caught with that, and even if they can't read it, you're obviously trying to hide something. Primitive steganography is like "Buy 7 bananas and 3 oranges on next Monday", which has plausible deniability as a grocery list, even though it's logging the movement of enemy naval units out of port.
Re:Hmm (Score:2, Interesting)
Any sufficiently advanced neural net should be able to deterministically find changes in common data communication where information can be hidden. And do you truly think that your data is not being checked by big brother?
[puts on tinfoil hat]
Re:Hmm (Score:5, Interesting)
Any sufficiently advanced neural net should be able to deterministically find changes in common data communication where information can be hidden. And do you truly think that your data is not being checked by big brother?
I doubt there's enough computational resources for a sufficiently advanced neural net.
If chunks of known ciphertext in something like AES-256 can't be broken in times measured in universe ages, then I can't foresee much success in wholesale scanning of all information, searching for embedded secret strings which, if properly encrypted, should be indistinguishable from random noise.
An old Slashdot story mentioned one of the most fertile fields for laying down stego messages: within spam [spammimic.com].
Re:Hmm (cracked) (Score:5, Funny)
with regardS To encryPtiOn.
You've got a nicely steganographed "first post" there.
Re:Hmm (cracked) (Score:3, Funny)
Yeah, well thanks to this article, I'm trying to find hidden information in the fortune cookie at the bottom of this very same article:
In
So far all I've got is that either puns on computing terms or directions to asassinate Bill Gates while he sunbathes by a middle-eastern riverbank during a total eclip
Re:Hmm (Score:2)
It needs to be plainly shown once and for all that this model of "encryption" is too dangerous to be used and thus force the government to encourage open standards that can be tried and found true.
Re:Hmm (Score:5, Insightful)
On the other hand, if you see a load of random pictures leaving $Company from lots of employees, then you have to find which picture has hidden data in it before you even know you have a problem.
The point of steganography isn't to pass a message that can't be read, it's to pass a message without alerting anyone to the fact that a message has been passed.
Re:Hmm (Score:4, Insightful)
for example, sending a message to someone your government doesn't like:
-you: "ha! it's encrypted really strongly! suck my balls!"
-government: "we don't give a flying fuck - even talking to them is a crime. off to jail for you, numbnuts!"
Already was an issue (Score:4, Interesting)
There was even an episode of Law and Order about this. Its nothing new, but I agree it does pose many questions about security. (Security through obscurity is really good if the level of obscurity is paramount.)
I'm quite certain... (Score:2)
Kjella
Can someone explain to me what is meant by... (Score:5, Insightful)
Re:Can someone explain to me what is meant by... (Score:4, Insightful)
Re:Can someone explain to me what is meant by... (Score:2)
GOURANGA!
Re:Can someone explain to me what is meant by... (Score:4, Interesting)
Re:Can someone explain to me what is meant by... (Score:2)
Explanation: Espionage (Score:3, Insightful)
Method: An image is built of bytes representing shades of colors. If you go through and change the least significant bit of each byte you can encode a message. Note: this is achieved without substantially changing the image.
Example: 10001000 becomes 10001001
Significance: If two people were to s
Re:Explanation: Espionage (Score:2)
This makes me wonder if it might even be possible to *find* pre-existing images (eg) that satisfy the requirements of the code without any modification at all.
If that were possible then good luck finding it with steganalysis...
Re:Can someone explain to me what is meant by... (Score:3, Insightful)
*reads the other responses* Child porn.. child porn.. child porn..
Heh, there's some fuckers with dirty minds posting today...
I'm going to guess they've just had this line beaten into their heads from the "think of the children" PR machine behind funding for things like steganalysis.
Honestly, how many pervs do you think are out there hiding their child porn with methods such as this? I'd guess very close to zero. I'm not saying there aren't weirdos out there who like to collect this sort of thing, I'
Great movie title! (Score:5, Funny)
Throw in a Stegosaurus [kdsi.net] and we've got a real Destroy All Monsters [imdb.com] vibe going.
Run! It's Steganalysis!
This reply is funny, inciteful and informative (Score:5, Funny)
Extinct? (Score:4, Funny)
Hiding data ...pfft (Score:5, Funny)
Re:Hiding data ...pfft (Score:5, Funny)
Re:Hiding data ...pfft (Score:5, Informative)
During the 50's and 60's the air force used a particular comic strip ("smokey stover" i think. http://www.toonopedia.com/smokey.htm [toonopedia.com], also the origin of "foo" and "foo fighter") to train recon. photo interpreters. The artist would hide his wife's name somewhere in every strip, and the new recruits would have to find it.
Re:Hiding data ...pfft (Score:2)
An easy way to hide information (Score:5, Funny)
Re:An easy way to hide information (PART 2) (Score:5, Interesting)
Heck, post as ac with a unique subject and post encrypted (gpg) ascii in multiple parts. the data will be here still next year or five (plausible) and you can retrieve it, and decrypt (assuming you have the public key or password if it's symmetric
Re:An easy way to hide information (PART 2) (Score:3, Insightful)
correct you are! (Score:2)
*cheers*
Re:An easy way to hide information (PART 2) (Score:2)
ahhh...so THAT's what all that incessant GNAA crap is.
Re:An easy way to hide information (Score:2)
Your basement?
~S
fun stuff (Score:5, Interesting)
The biggest problems were 1. most (actually, all) of the images that came back as good candidates for having embedded images came back as false positives and 2. lack of a brute-force steg break utility.
number 2 is probably a result of poor searching on my part, but I honestly couldn't find a recent, (and free) tool that would do a brute force crack on embedded images. At the time (a few months back) I was using stegbreak and stegdetect.
So, is there anything better? anyone else have any luck?
Re:fun stuff (Score:2)
Re:fun stuff (Score:2)
It far more practical to encrypt the data you want to hide (making it look random), then you hide it use steganography. This has the added benefit of making it more difficult to find a pattern (encrypted data should appear random) in t
Re:fun stuff (Score:2, Funny)
You can only design a brute force attack once you know how it was hidden in the first place. And the amount of different ways to do that right now precludes such an attack.
Maybe once a standard for steganography is agreed on we can get started on ways to crack it
Re:fun stuff (Score:2)
But, using stegbreak, you could only do a dictionary attack against the image even though you had an idea of what what used to embed the file.
Re:fun stuff (Score:2)
It's kind of like hiding your key under the doormat. Everyone knows that's where people hide keys, so nobody hides keys there because it's useless now.
Unfortunately, the problem of coming up with such a generic pattern-finding algorithm that it'd be truly useful for trying to detect steganography in general is not an easy problem. It should be quite possible to try a lot of popular methods, though.
Re:fun stuff (Score:2)
Anyone know what I'm talking about.
Re:fun stuff (Score:4, Interesting)
Passwords (Score:5, Interesting)
I can certainly see the use in espionage, hiding the real message in the static, as it were (Didn't a Tom Clancy book use this plot device? I think the message was sent in the connect noises for the modem). And NS's Baroque Cycle had some interesting steganographic bits in it (excessively long and boring letters about the nobility's obsession with fashion hiding an encrypted message for all to see). But on a day to day basis, I doubt this will affect most people.
Re:Passwords (Score:2)
Finding hidden messages? (Score:2, Funny)
to us indicating your interest in our newsletter
If you no longer wish to receive our publications simply
reply with a Subject: of "REMOVE" and you will immediately
be removed from our mailing list . This mail is being
sent in compliance with Senate bill 2116 , Title 3
; Section 304 ! This is different than anything else
you've seen . Why work for somebody else when you can
become rich within 56 MONTHS . Have you ever noticed
more people than ever are surfing the
Re:Finding hidden messages? (Score:2)
Let's try that again... (Score:2)
Charset: ISO-8859-1
Version: GnuPG v1.2.5 (MingW32)
Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org
VGhhbmtzISBJIG5lZWQgYWxsIHRoZSBsdWNrIEkgY2FuIGd
-----END PGP MESSAGE-----
...which is base64 encoded for ... (Score:2)
Problem with statistical analysis (Score:5, Interesting)
The problem here seems to be that if you were to compress your hidden data prior to hiding it, then the data inserted would appear random and should thwart statistical analysis. You'd need some redundancy there if you intent to jpeg compress the image, but it might work.
I've toyed with the idea of hiding data in the vectors used in a mpeg file. Exploiting the nature of the compression algorithm rather than the source data.
Re:Problem with statistical analysis (Score:2, Interesting)
The problem here seems to be that if you were to compress your hidden data prior to hiding it, then the data inserted would appear random and should thwart statistical analysis.
The problem is, the LSBs of a photo do not appear to be random; there are many subtle correlations between them, some of them human-visible and some of them computer-visible. A given known machine-visibl
Re:Problem with statistical analysis (Score:2)
There's a good story on something vaugely related that has to do with the frequency of digits in measured numbers. (That is, it isn't equally probable to see every digit -- earlier digits in a number favor lower digits, like "1".) People who were falsifying accounting records were caught becaus
Re:Problem with statistical analysis (Score:5, Informative)
Actually, here the fault is that they didn't understood the target. Expenses have no "natural" size, they're likely to be scale invariant. Basicly, you're looking for a distribution where C*f(x) = f(x). If you took 1..9, try C=2: 2,4,6,8,10,12,14,16,18... suddenly you have 5 leading 1s.
Turns out the right distribution is following Benford's law:
30.1% 17.6% 12.5% 9.7% 7.9% 6.7% 5.8% 5.1% 4.6%
The second example you have is that the human "RNG" is flawed.
A computer doesn't really suffer from this problem. The stenagography problem is really this.
1. Find randomness in source data
2. Replace random data with pseudorandom data
Of course, if you overwrite non-random data, you're doing it wrong. If you're going to use the LSB, you need to verfiy that it is random, or find the portion of it that is random (which is kinda what you're doing when you pick the LSB from a pixel anyway).
The biggest problem is really to hide it in a "reasonable" way.
Perfect steganography should replace all randomness with noise.
Perfect compression should eliminate all randomness.
In other words, steganography operates on the thin slice between good compression (jpg, mp3, divx) and perfect compression. It's much easier to hide information in bmp, wav, uncompressed avi, but it also looks damn obvious.
Kjella
Re:Problem with statistical analysis (Score:2)
Yes, in order to do good steganography you have to replace something that already looks random with something else that looks equally random.
The problem with what was referred to originally is that the least significant bits of an image are not necessarily uncorrelated to (a) position in the image (b) values of neighboring
Re:Problem with statistical analysis (Score:3, Informative)
No, you eliminate some redundancy, thus *increasing* the randomness. The whole point is, with compression, if your output is less than perfectly random, then you must be able to compress more, as there are additional patterns that can be eliminated. Or, at least that was my understanding.
In support of this is fact that you can't compress a perfectly random data stream. Why? Because there is no redundancy to eliminate. And a perfect compression algorithm should ou
Re:Problem with statistical analysis (Score:2)
Re:Problem with statistical analysis (Score:2)
Also, if you're doing LSB hiding
Re:Problem with statistical analysis (Score:2)
DCT + spread spectrum (Score:3, Interesting)
It works pretty well.. but I did it in PHP+GD, so it's pretty slow...
if anyone is interested, I have a paper that describes the methods, the PSNR and everything else... you can reach me at my gmail server, under the dangil alias
Secret Stuff (Score:3, Funny)
how is this possible? (Score:2, Interesting)
Excecpt when I hide it I use the least significant bit of every n bytes where n is a 10 digit sequence.
[1,2,3,4,3,2,1,2,6,7]
the first source bit is stored in the lsb of the first image byte.
the second source bit is stored in the lsb of the [1+2] image byte.
the third source bit is stored in the lsb of the [1+2+3] image byte.
If the end of the image file is reached be
Re:how is this possible? (Score:3, Insightful)
['h', 'e', 'l', 'l', 'o', 'w', 'o', 'r', 'l', 'd']
and I pass it through a plugboard that has trillions of different combinations, and then through a set of 4 rotors which can be started from trillions of starting points, have many different internal wiring patterns, move in different ways and can be started from different positions each time and light up a new letter each time.
How do I decode
Re:how is this possible? (Score:2)
I will try every possible algorithm I know
Ok, so you've found the data from the noise, not an easy task by itself. Then what? Brute force the encryption?
Steganography isn't "security through obscurity," its just obscurity. Which can be useful when not only do you need security, but you don't want people (easily and obviously) knowing you are needing the security. I know the world shouldn't work this way, but sending an
Is this really a good article on steganalysis? (Score:3, Informative)
Reference [11] is for the F5 algorithm: Yet consider this paper: The abstract from Fridrich et al. says "... we present a steganalytic method that can reliably detect messages
So TFA article cites countermeasures from 2001, even though a method of defeating those countermeasures was published in 2002.
The above is just one example. Overall, TFA seems poor and out-of-date. This is a case where the F in "TFA" does not stand for "fine".
v Stegosaurus! (Score:4, Funny)
Googlefight (Score:3, Funny)
Steganography wins.
Possibilities (Score:2, Interesting)
At the same time however, it seems like steganography has some inherent flaws in it. That is to say, the more people use is, the quicker people will be able to determine patterns in the method. This would allow people/groups/countries/etc. to find the mess
A stego method that actually works (Score:2, Interesting)
Remember the post 9/11 image-messaging concern? (Score:3, Interesting)
I seem to recall a distributed screen-saver type app that was being used to crunch through millions of hosted images. Not much to find online about this, but there are articles like this one [newscientist.com] at NewScientist.com suggesting that the effort was a washout. here [xtdnet.nl] are some more stats from a study that came up dry, but there always this reference [xtdnet.nl] to "first stenographic image in the wild" as reported by ABC back when.
Remember Tiananmen Square (Score:3, Insightful)
Make no mistake, the current chinese government may represent a "kindler, gentler" communist regime, but its mere existence is still a crime against humanity.
Lee
Re: (Score:2, Offtopic)
I have used this technique for decades! (Score:3, Funny)
Application more important than Technique? (Score:3, Interesting)
Using statistical methods, most steganography can be broken either now or in the near future if the steganalyst can spend a lot of time and computing resources on each candidate bit collection, and if you're hiding a lot of bits in each collection. The consequence: don't hide very many bits, and widen the search space by hiding your trees in a forest of significant size, so that the amount of CPU the analyst can use on any particular tree is low.
Key exchange is a great candidate for steganography. And to make sure the population of innocuous bit collections around yours is high, find a place where a lot of people around you are dealing in large quantities of bits: music collections at a university, or spam messages on an e-mail relay.
multiple channels (Score:2)
Just a thought...
Steganographed DeCSS? (Score:2)
How about doing the same thing like say... encoding the full DeCSS source code in plaintext steganography, using words' length?
For example:
a) Encode to octal. 010205000506030102
b) Add 1. 2/3/6/1/6/4/2/3
c) Encode. "My fav. mangas: I wonder what is erm..." etc.
Just a thought.
But has it ever actually been detected? (Score:2)
Is steganography in multimedia images really being used, or is it just a paranoid fantasy?
(Yes, I know--if it has never been detected, thatproves that it works....)
Real Application (Score:2)
What I want to know is how is steganography, (and more importantly steganalysis), applied to network communication? If I have a network that has very defined traffic, how could someone embed their own data in our normal traffic. And how could I detect it?
Metasteganography (Score:5, Insightful)
What strikes me as most curious is that the current debate about steganography is in itself an exercise in steganography--at least, in the sense of hiding important information in plain sight. Through the use of technical-sounding words, concerned parties manage to conceal what seems to be a genuinely frightening disrespect of the freedom of information.
Simply take "steganography" out of the equation. It's easy to scare the masses by using intimidating neologisms. But steganography is simply a manner to transmit information privately. So let's recast the sentence, "...illicit use of the technique might become a threat to the security of the worldwide information infrastructure." Let's simply say, "Individuals attempting to keep their private information private might become a threat to the security of the worldwide information infrastructure."
What used to be a preferred method for sending private information to a friend? The mail? Didn't we used to have a respect for the privacy of letters we sent via post? So how come no one said, "Sealing envelopes might become a threat to the security of the worldwide information infrastructure"?
What's being steganographically hidden in this debate is the reality that these days, quite a few people--many of them in power--simply no longer believe that a person has any right to private or personal information. Why would a technology such as this arise in the first place? Because we know that the first anthrax envelope made the private post public for everyone? Because we know our e-mail can be read, our servers can be hacked, our telephone calls recorded and our houses ransacked simply because fear of terrorists convinced us to sign over our civil liberties as if we no longer desired them?
This technology arose because some people realized that they were losing any pretense at privacy they might have had, and so were motivated to develop tools to maintain it. And now, we take the new word "steganography" and talk about how dangerous it is... perhaps because we're trying to conceal inside the hidden message that all privacy is dangerous, that anything you do, say or think should always be subject to review by the appropriate authorities.
give it up, guys (Score:2)
Governments, companies, and everybody else simply have to get used to the fact that if anybody cares, they can hide and transmit information to anyone. I'm not sure that's a good thing--it also interferes with things like whistleblowing--but it's just the way it is.
Detection? (Score:3, Informative)
You'll have to forgive me, I'm not the greatest cryptographer in the world. But let's say that Joe Shmoe takes a picture with his cheap 8-megapixel camera, with a very high ISO setting for lots of noise. Now, that's roughly 192 megabits of information.
Suppose he needs to encode a 1 kilobit message. that means that there's going to be one bit of signal for every 192 kilobits of image. Now, say he does the encoding to merely appear like more noise in the already noisy image.
Given that low of a signal-to-noise ratio, I really don't see how you could detect the message unless you had prior knowledge of the algorithm or locations.
steve
Plain text (Score:3, Insightful)
Re:stegnography is security through obscurity (Score:2)