An Overview of Steganography

Steganography is a useful tool that allows covert transmission of information over an overt communications channel. Combining covert channel exploitation with the encryption methods of substitution ciphers and/or one time pad cryptography, steganography enables the user to transmit information masked inside of a file in plain view. The hidden data is both difficult to detect and when combined with known encryption algorithms, equally difficult to decipher. This paper provides a general overview of the following subject areas: historical cases and examples using steganography, how steganography works, what steganography software is commercially available and what data types are supported, what methods and automated tools are available to aide computer forensic investigators and information security professionals in detecting the use of steganography, after detection has occurred, can the embedded message be reliably extracted, can the embedded data be separated from the carrier revealing the original file, and finally, what are some methods to defeat the use of steganography even if it cannot be reliably detected.

[1]  Butler W. Lampson,et al.  A note on the confinement problem , 1973, CACM.

[2]  Manfred Wolf Covert Channels in LAN Protocols , 1989, LANSEC.

[3]  Ronald L. Rivest,et al.  The MD5 Message-Digest Algorithm , 1992, RFC.

[4]  Theodore G. Handel,et al.  Hiding Data in the OSI Network Model , 1996, Information Hiding.

[5]  Sushil Jajodia,et al.  Exploring steganography: Seeing the unseen , 1998, Computer.

[6]  Sushil Jajodia,et al.  Steganalysis: the investigation of hidden information , 1998, 1998 IEEE Information Technology Conference, Information Environment for the Future (Cat. No.98EX228).

[7]  Ross J. Anderson,et al.  On the limits of steganography , 1998, IEEE J. Sel. Areas Commun..

[8]  Andreas Pfitzmann,et al.  Attacks on Steganographic Systems , 1999, Information Hiding.

[9]  Jessica J. Fridrich,et al.  Reliable detection of LSB steganography in color and grayscale images , 2001, MM&Sec '01.

[10]  Marc Rennhard,et al.  A Practical and Effective Approach to Large-Scale Automated Linguistic Steganography , 2001, ISC.

[11]  Gregg H. Gunsch,et al.  Blind Stenanography Detection Using a Computational Immune System: A Work in Progress , 2003, Int. J. Digit. EVid..

[12]  Niels Provos,et al.  Hide and Seek: An Introduction to Steganography , 2003, IEEE Secur. Priv..

[13]  Deepa Kundur,et al.  Practical Internet Steganography : Data Hiding in IP , 2003 .

[14]  Yuewei Dai,et al.  Breaking Predictive-Coding-Based Steganography and Modification for Enhanced Security , 2006 .

[15]  Kevin Curran,et al.  An evaluation of image based steganography methods , 2006, Multimedia Tools and Applications.