Steganography is a way to communicate a message such that no one except the sender and recipient suspects the existence of the message. This type of covert communication lends itself to a variety of different purposes such as spy-to-spy communication, exchange of pornographic material hidden in innocuous image files, and other illicit acts. Computer forensic personnel have an interest in testing for possible steganographic files, but often do not have access to the technical and financial resources required to perform steganalysis in an effective manner. This paper describes the results of a funded effort by a grant from the National Institutes of Justice to develop a user friendly and practical software program that has been designed to meet the steganalysis needs of the Iowa Division of Criminal Investigation in Ankeny, Iowa. The software performs steganalysis on JPEG image files in an efficient and effective way. JPEG images are popular and used by a great many people, and thus are naturally exploited for steganography. The commercial software that is available for detection of hidden messages is often expensive and does not fit the need of smaller police forensic labs. Our software checks for the presence of hidden payloads for five different JPEG-embedding steganography algorithms with the potential of identifying stego images generated by other (possibly unknown) embedding algorithm.
[1]
Catherine Taylor Clelland,et al.
Hiding messages in DNA microdots
,
1999,
Nature.
[2]
Niels Provos,et al.
Hide and Seek: An Introduction to Steganography
,
2003,
IEEE Secur. Priv..
[3]
Noel Cressie,et al.
Texture synthesis and pattern recognition for partially ordered Markov models
,
1999,
Pattern Recognit..
[4]
Niels Provos,et al.
Detecting Steganographic Content on the Internet
,
2002,
NDSS.
[5]
Frank Adelstein,et al.
FAUST: Forensic artifacts of uninstalled steganography tools
,
2009,
Digit. Investig..
[6]
Vladimir N. Vapnik,et al.
The Nature of Statistical Learning Theory
,
2000,
Statistics for Engineering and Information Science.
[7]
Tomás Pevný,et al.
Merging Markov and DCT features for multi-class JPEG steganalysis
,
2007,
Electronic Imaging.
[8]
Andreas Westfeld,et al.
F5-A Steganographic Algorithm
,
2001,
Information Hiding.
[9]
Jennifer L. Davidson,et al.
Steganalysis Using Partially Ordered Markov Models
,
2010,
Information Hiding.
[10]
Konstantinos Konstantinides,et al.
Image and Video Compression Standards: Algorithms and Architectures
,
1997
.