Research on Steganalysis for Text Steganography Based on Font Format

In the research area of text steganography, algorithms based on font format have advantages of great capacity, good imperceptibility and wide application range. However, little work on steganalysis for such algorithms has been reported in the literature. Based on the fact that the statistic features of font format will be changed after using font-format-based steganographic algorithms, we present a novel Support Vector Machine-based steganalysis algorithm to detect whether hidden information exists or not. This algorithm can not only effectively detect the existence of hidden information, but also estimate the hidden information length according to variations of font attribute value. As shown by experimental results, the detection accuracy of our algorithm reaches as high as 99.3% when the hidden information length is at least 16 bits.

[1]  Edward J. Delp,et al.  Attacks on lexical natural language steganography systems , 2006, Electronic Imaging.

[2]  Nasir D. Memon,et al.  Steganalysis of audio based on audio quality metrics , 2003, IS&T/SPIE Electronic Imaging.

[3]  Jessica J. Fridrich,et al.  Quantitative steganalysis of digital images: estimating the secret message length , 2003, Multimedia Systems.

[4]  Shawn A. Butler Security attribute evaluation method: a cost-benefit approach , 2002, ICSE '02.

[5]  C. Goth The ins and outs of IT outsourcing , 1999 .

[6]  Yang Yi-xian Research on the detecting algorithm of text document information hiding , 2004 .

[7]  Giorgio Gallo,et al.  Directed Hypergraphs and Applications , 1993, Discret. Appl. Math..

[8]  Ahmad-Reza Sadeghi,et al.  Property-based attestation for computing platforms: caring about properties, not mechanisms , 2004, NSPW '04.

[9]  Hui Luo,et al.  A Steganalysis Method Based on the Distribution of First Letters of Words , 2006, 2006 International Conference on Intelligent Information Hiding and Multimedia.

[10]  Steven H. Low,et al.  Copyright protection for the electronic distribution of text documents , 1999, Proc. IEEE.

[11]  Bharat B. Madan,et al.  A method for modeling and quantifying the security attributes of intrusion tolerant systems , 2004, Perform. Evaluation.

[12]  Mario Piattini,et al.  PWSSec: Process for Web Services Security , 2006, 2006 IEEE International Conference on Web Services (ICWS'06).

[13]  Wolfgang Emmerich,et al.  The monitorability of service-level agreements for application-service provision , 2007, WOSP '07.

[14]  Vijayalakshmi Atluri,et al.  Security for Workflow Systems , 2008, Handbook of Database Security.

[15]  Elisa Bertino,et al.  The specification and enforcement of authorization constraints in workflow management systems , 1999, TSEC.

[16]  Siwei Lyu,et al.  Detecting Hidden Messages Using Higher-Order Statistics and Support Vector Machines , 2002, Information Hiding.

[17]  Jan H. P. Eloff,et al.  Designing role hierarchies for access control in workflow systems , 2001, 25th Annual International Computer Software and Applications Conference. COMPSAC 2001.

[18]  Pradeep Kumar Ray,et al.  Evaluation methodology for the security of e-finance systems , 2005, 2005 IEEE International Conference on e-Technology, e-Commerce and e-Service.

[19]  Joon S. Park,et al.  Access control mechanisms for inter-organizational workflow , 2001, SACMAT '01.

[20]  Vladimir N. Vapnik,et al.  The Nature of Statistical Learning Theory , 2000, Statistics for Engineering and Information Science.

[21]  Corinna Cortes,et al.  Support-Vector Networks , 1995, Machine Learning.

[22]  Ronda R. Henning,et al.  Security service level agreements: quantifiable security for the enterprise? , 1999, NSPW '99.

[23]  Andreas Schaad,et al.  A model-checking approach to analysing organisational controls in a loan origination process , 2006, SACMAT '06.