C URRENT S TATE OF S TEGANOGRAPHY : U SES , L IMITS , & I MPLICATIONS Sophie Engle ([email protected]) University of California, Davis College of Engineering Department of Computer Science http://www.cs.ucdavis.edu/

Abstract Steganography has received considerable press in the last three years, mostly due to the war on terror. This paper discusses the state of steganography by examining its current uses, limitations, and implications. In addition, this paper addresses the relationship between steganography, steganalysis and terrorism.

I.

Introduction

Since 2001, there have been over 25 articles published online by major news sites such as ABC News, BBC News, CNN, MSNBC News, Wired News, and USA Today on the topic of steganography and terrorism (see Appendix A). Most of these articles make or refute claims that terrorists are using steganography as a method of communication. Steganography is an ancient discipline which usually refers to hiding information within information. Today, this is usually accomplished by hiding secret messages inside images or other forms of multimedia. To most people, these altered images appear no different from normal images. Ideally, only parties using the images as a means of communication have the ability to detect the hidden messages. In addition to addressing the significant press steganography has received recently, the goal of this paper is to analyze the current uses, limits, and implications of steganography. The next section defines common terminology. The rest of the paper is organized as follows: • The Cryptography section discusses the relationship between cryptography and steganography. • The Past Methods section first gives the “classical application” of steganography. It then discusses various methods employed in the past. The Current Tools section focuses on modern steganographic tools.

• The Limitations section addresses the weaknesses and limits of steganography. This section also discusses under what conditions steganography becomes an impractical tool for communication. • The Implications section examines the positive and negative implications of steganography. Included is a discussion of the relationship between steganography and terrorist communication. • The detection and removal of steganographic messages is covered in the Steganalysis section. The effectiveness and usefulness of these actions are also addressed. • Following the Conclusion section, the Resources section provides various resources in the field of steganography and steganalysis which may not otherwise be mentioned in this paper. This paper also includes an appendix (Appendix A) of freely available news articles on the links between steganography and terrorism since 2001.

II.

Terminology

Steganography is often discussed alongside watermarking, fingerprinting, covert channels, subliminal channels, and cryptography. In actuality, these subjects are all sub-disciplines of information hiding [1]. Watermarks and Fingerprints. Both watermarking and fingerprinting are types of robust copyright marking [1]. Watermarking hides ownership or copyright information inside an object, such as an image or file. Fingerprinting hides identification or license information such as serial numbers inside objects. The former identifies the owner, while the latter identifies the user. Two main properties distinguish copyright marking from steganography. The first is detection. Steganography exists to prevent detection of

Current State of Steganography: Uses, Limits, & Implications

information. If hidden information is detected, it is compromised. However, it is desirable to detect the presence of copyright marks. The second difference involves destruction. While robustness is merely desired in steganography, it is required for copyright marking. For example, cropping a picture or changing an image format should not destroy copyright information. Covert Channels. Covert channels rely on shared resources as a path of communication [2]. Covert channels misuse these shared resources to create communication paths that are “neither designed nor intended” to transfer information [1]. Steganography, on the other hand, hides information in normal paths of communication. Subliminal Channels. [3] defines subliminal channels similarly to steganography, except that significantly smaller amounts of information are exchanged. Subliminal channels focus more on leaking information than actual communication. However, differences between steganography and subliminal channels are minimal. Subliminal channels and steganography are often used interchangeably. Cryptography. Considering that strong cryptographic algorithms often disguise information as random noise, cryptography can also be thought of as a sub-discipline of information hiding [4]. One of the main differences between cryptography and steganography is the goal each attempt to achieve. Cryptography is concerned only with protecting secret information (often in some mathematical manner). Steganography is concerned with concealing the existence of secret information [1]. More on the relationship between cryptography and steganography will be discussed in the next section. Steganalysis. Steganalysis involves “discovering and rendering useless” information hidden through steganography [5]. More information on steganalysis and its significance is presented in section VIII. The main focus of this paper will be on steganography and steganalysis. For more on information hiding and its sub-disciplines refer to [1, 2]. More on terminology specific to steganography can be found in [6].

III.

Cryptography

As mentioned in [7], steganography should not replace cryptography. It is important to realize the goals,

Sophie Engle, June 2003

advantages, and disadvantages of both before deciding which should be employed. In most cases, however, steganography and cryptography complement each other extremely well. Consider the following scenario. A U.S. spy has critical information concerning an upcoming terrorist attack. The sensitivity of the information requires that it be encrypted. However, sending encrypted information is like running around shouting “I have secret information I do not want you to see!” Considering the spy may be in an extremely hostile environment, this is undesirable and dangerous. Instead, suppose the spy uses steganography to hide the encrypted information in a humorous photo. The spy may then send this photo to several “friends” without raising alarm. This allows the spy to communicate secret information secretly. steganography

+

cryptography

equals secret communication

of

secret information

Figure 1: Steganography and cryptography The above scenario demonstrates how steganography can supplement cryptography [Figure 1]. Likewise, cryptography may supplement steganography. For instance, steganography often involves hiding information “in the noise” of images [4]. As mentioned earlier, cryptography often transforms messages into what appears to be “random noise.” Therefore, actual noise can be replaced with encrypted information without changing the statistical properties of the image. This makes steganalysis much more difficult.

IV.

Past Methods

The primary goal of steganography is to enable undetected, secret communication. The classical application of steganography is given by [8], and is known as the “Prisoner’s Problem” [Figure 2]. The problem involves two accomplices to a crime, about to be locked up in separate prison cells. The prison warden allows limited communication between the two individuals. The criminals want to devise and coordinate an escape plan, without alerting the warden. However, the warden is particularly suspicious of the two criminals and monitors all communication between them. This is an ideal situation for the application of steganography.

2

Current State of Steganography: Uses, Limits, & Implications

movies, or sound [3]. More information on how these tools work can be found in [7] and in section VI.

Figure 2: Prisoner’s Problem. Communication across boundary via monitored channels. Several examples of steganography existed before the prisoner’s problem was proposed in 1983. Hidden messages placed under the wax of writing tablets were used to alert the Greeks of Xerxes’ hostile intentions [9]. Microdot technology, where messages are reduced to the size of a dot and hidden in periods, was used during World War I [1]. Messages written between lines of text with invisible ink were used during the start of World War II [7]. Also used in World War II were messages hidden in the letters of seemingly “innocent” text [Figure 3]. Most of these techniques depend on security through obscurity [1]. If an adversary discovers the technique used to hide messages, all messages are compromised. Section VII (Limitations) discusses this problem further. Steganography has evolved through the ages. From the first documented practices in the 16th century to the age of ubiquitous internet connectivity, steganography has adapted through political and technological change. The next section discusses the current generation of steganographic tools.

V.

Current Tools

Steganography has been greatly impacted by the Internet and digital media. Modern steganography refers mostly to hiding information in images, pictures, Apparently neutral’s protest is thoroughly discounted and ignored. Isman hard hit. Blockage issue affects pretext for embargo on by-products, ejecting suets and vegetable oils. Pershing sails from NY June 1

Figure 3: Example message sent by spy in WWII [7]. Message decoded by extracting every second letter. Sophie Engle, June 2003

JSteg, JPHide [10], and OutGuess [11] are popular tools that hide messages in JPEG image files [12]. The program MandelSteg [7] hides information inside Mandelbrot fractal images [Figure 4]. A general method of using images for secure communication is found in [13]. S-Tools [7] hides information in both images and audio. mp3stego [14] is a popular steganography tool using mp3 files.

Figure 4: Fractal image with hidden message “This is an example of MandelSteg.” Created with MandelSteg 1.0. Spam has also become an ideal “cover” for hidden information. SpamMimic is a popular steganography tool that allows users to hide information inside spam messages [15]. Various other tools exist. The program wbStego hides information in PDF documents [16]. [17] refers to a method of hiding information in executables by exploiting redundancies in the Intel x86 instruction set. A brief discussion on hiding information in unused header fields of various network protocols is found in [18]. Snow [19] and various other tools hide information using spacing in ASCII text. There is even a method which hides information inside DNA [20, 21]. Some tools use steganography for applications other than communication. DriveCrypt/ScramDisk allows virtual disks to be hidden in WAV files [22]. StegFS is a steganographic file system for Linux [23]. Both of these programs conceal the existence of information on a computer (ideal for hiding cryptographic keys). Most of these tools are archived online [24, 25]. The implications of this easy accessibility are discussed in section VII.

3

Current State of Steganography: Uses, Limits, & Implications

VI.

Limitations

The primary application of steganography is secret communication. However, steganography is not necessarily best for every situation requiring secret communication. Understanding the limitations of steganography is important before deciding on its usefulness in a specific situation. Below are some of the limitations and difficulties related to steganography. Knowing when and where to look for steganographic content is sometimes difficult. Consider the example where Herodotus wrote warning of the imminent invasion by Xerxes underneath the wax of a writing tablet. Sparta, the recipient of the “blank” tablet, was almost fooled and could have easily missed the warning [1]. This illustrates one limitation of steganography. For steganographic communication to function, the recipients must have some reason to look for hidden messages. At the same time there must be nothing about the “hidden message” that would alert nonrecipients and lead to inspection. In fact, this problem in general relates to how steganographic communication often requires a “shared secret.” Such shared secrets may be when and where to look for hidden messages, and how to extract hidden information once obtained. This information must remain secret; otherwise the goal of hidden communication is defeated. There are cases where an opponent can find the hidden messages and how the messages were hidden – but still not be able to extract the actual hidden message. Such a system is known as a secure stego-system, but still requires a shared secret, which in most cases is a cryptographic key [1]. How is this secret information communicated between parties? In the case of modern secure steganographic communication, the key may also be sent using steganography. However, the parties must still know to look for the key itself. At some point, most modern steganography requires secret and unsuspicious communication to occur between parties without the use of steganography. Communicating such information can be difficult, depending on the situation. The idea of “secure” steganography is relatively new. Older methods of steganography depended on security through obscurity [1], where security of information depended on the method of communication remaining Sophie Engle, June 2003

secret. Today, systems dependent on security through obscurity are frequently not considered secure at all. This leads to one of the major limitations of steganography today. While Shannon provided a theory of secrecy systems and Simmons provided a theory of authentication [1], steganography itself is not a solid science [4]. In contrast to secrecy and authentication, steganography is much more dependent on the information source used to hide messages [1, 9]. However, there has been considerable work to formalize steganography [26, 27] and the field is rapidly growing. Another limitation to modern steganography is illustrated well in [3]. Suppose two persons decide to communicate by hiding messages in image files. If these two persons have never exchanged images before, this act may seem suspicious and prompt investigation. This is especially true when odd images are used. Such methods only work when they can be used within existing communication patterns. Modern steganography is also limited by the cover used. Assume images are used. Once an image has been used to hide a message, the original should be destroyed [3]. Otherwise, someone may notice the difference between the original and stego-image (image with a hidden message). This means images widely available on the internet should not be used, as the originals can not be destroyed. This also means images should not be reused. The number of hidden messages that can be sent becomes limited by the number of inconspicuous images that can be produced by the sender. Only so many pictures of the “family dog” can be sent before it begins to raise suspicion. Lastly, steganography is also susceptible to multiple attacks. These attacks and their effectiveness are discussed in section VIII.

VII. Implications Modern steganography and its accessibility enable a multitude of uses. One of these is to communicate not only secretly, but also anonymously [4]. Similarly, chapters 4 and 9 of [4] describe how steganography can be used to provide some degree of deniability. Having a file with a hidden message does not necessarily mean you know of its existence. This is especially true for steganographic communication taking place on public file sharing networks such as Kazaa or Gnutella. Since there are many possible recipients, it is difficult determine the intended recipient. Also, since there are 4

Current State of Steganography: Uses, Limits, & Implications

Osama bin Laden to plan terrorist attacks. Kelly goes as far as to call steganography “a terrorist’s tool” in [A27]. Most of these articles received a good deal of criticism, due to lack of evidence. In fact, a massive search for such “hidden terrorist plots” turned up empty [A16, 28]. However, as stated by [4], there is no doubt that steganography could have been used. Possible evidence was eventually identified [A10, A05, A03], but finding such evidence proved difficult. In fact, evidence in [A03] was not found in the estimated 28 billion images and 2 billion web sites on the Internet [A27], but on actual computers seized from suspected terrorists. The actual and potential effectiveness of terrorist communications using steganography has resulted in a backlash against steganography and cryptography in general. This has lead to discussion on further restricting the two technologies. Several steganography websites, such as [29, 30], have had to limit the information presented due to the “legality” of the research.

Figure 5: Two different possibilities of steganographic communication for prisoner’s problem. In case 1 the warden is the adversary. In case 2, the prisoners are the adversaries. several possible sources, it is difficult to determine the original sender. Private communication in general has a multitude of uses. However, as stated by [4], technology is neutral. Technology can be utilized by both the forces of good and evil. In fact, steganographic communications will always involve some adversary, by its very definition. For example, consider the prisoner’s problem from [8] (summarized in section IV). For the first case, suppose the prisoners are innocent victims of an oppressive regime. In this case, the warden of the oppressive regime becomes the adversary. On the other hand, suppose the prisoners are terrorists. In this case, the prisoners using steganography to communicate an escape plan become the adversaries [Figure 5]. The possibility of terrorists using steganography has received much press following the September 11th terrorist attacks (see Appendix A). The article [A26] is one of many claiming steganography was used by Sophie Engle, June 2003

However, the idea of banning steganography or cryptography is somewhat impractical. Schneier points out that the spread of cryptography can not be limited [31]. Another argument notes that if cryptography is outlawed, only the outlaws will have cryptography [4]. The same arguments hold for steganography. Also, such a ban would be devastating to privacy [32], preventing the “honest” from having access to tools using these techniques [4]. There is a thin line between steganography and other information hiding techniques, the banning of which would have far reaching effects. For example, steganography utilizes many of the same techniques as copyright marking. Such copyright marking techniques helped law enforcement to track down the Melissa virus author by the serial number (or fingerprint) embedded in the programs used [33]. These techniques are also crucial in prevention of software piracy. Perhaps the most important argument against banning steganography is that it would do nothing to prevent terrorism [4, 34]. Not only could terrorist still create and use steganographic tools despite any ban, but as pointed out in [35], there are plenty of other methods of communication open to terrorists. Terrorist also operate outside the reach of United States government, limiting the effectiveness of restrictions.

5

Current State of Steganography: Uses, Limits, & Implications

If banning is not the solution, then is there another way to prevent terrorist use of steganography? The answer in short is no [31]. Technology is unable to provide an “ultimate solution” to this problem [4]. Even steganalysis, as discussed in the next section, has multiple obstacles it must overcome to be effective.

VIII. Steganalysis While detection is enough to defeat the purpose of steganography, modern steganalysis is concerned with extraction and destruction of hidden messages as well. Each of these, however, are difficult problems. Detection. The first obstacle detection must overcome is the sheer volume of information that must be analyzed. Consider the situation where steganographic messages are being hidden in multimedia files on the Gnutella network. As shown in [36], over 65% of 15,153,524 unique queries request multimedia files. This suggests a tremendous amount of files requiring steganographic analysis. Finding steganographic images on the Internet is an even harder task. In 2001, the estimated number of images on the Internet was over 28 billion [A27]. Identifying steganographic content in spam is even more overwhelming. In 2002, it was estimated that a spammer could send 650,000 messages every hour [37]. Just last month, the percentage of email that is spam passed 50% [38]. A large amount of this spam also comes from overseas, outside the reach of law [39]. Another complication is the dynamic nature of most electronic networks. Image ads frequently change. New online auctions are added every day. Websites appear and disappear rapidly. All of these are potential places to find steganographic content. Such information must be processed real-time or archived. Both are difficult. Real-time processing requires high-end equipment and efficient algorithms. Short-cuts may have to be made, decreasing effectiveness. Archiving requires enormous amounts of space to store information for processing. Once information is processed, it may be too late to take action. Most detection techniques are statistical, searching for files which do not appear normal [41]. However, defining “normal” is not an easy task. For example, photographs, paintings, drawings, and graphics have different image characteristics [41]. Some techniques instead look for “signatures” of certain steganographic tools. One such study used this technique on two million images downloaded from eBay, but was not Sophie Engle, June 2003

able to find a single hidden message [12]. This does not say hidden messages were absent, since this technique only detects known signatures. It can not account for messages hidden with other techniques. Extraction. Older steganographic methods were primarily concerned with concealing the existence of hidden messages. Once a hidden message was detected, often times it was easily read. This is not true with most modern steganographic tools. These tools often combine cryptography and steganography, protecting the hidden message with a secret key. Knowing a message exists and the method used to hide it is insufficient to extract the message itself. Knowing the method does allow for attacks on the message. Some attacks attempt to guess the secret key used to protect the message. For example, StegDetect uses a dictionary attack against suspicious files to extract the contents of a hidden message [12]. However, StegDetect only works against messages hidden with the known method and a key susceptible to dictionary attacks. In general, the cost associated with extracting hidden messages hinders its usefulness. One might envision a SETI-like program that allows distributed detection and extraction of terrorist messages in images. However, the usefulness of such a program is limited by the concept of security through obscurity. Once the method of detection such a program uses is known, detection by that program can also be avoided. Destruction. Destruction of steganographic messages is accomplished in several ways. For example, consider a steganographic message hidden in an image. Suppose before the image reaches the recipient, it is slightly cropped. This subtle change may be enough to disable the recipient’s ability to recover the message. Other image operations have the same effect, such as changing the hue or rotating the image. Destruction can also be accomplished by adding a new hidden message, overwriting an existing one. Compression is another operation common to images and other multimedia files. Compression decreases file size by removing redundant or unnecessary information. These operations are destructive to many forms of modern steganography. If compression occurs after a message is hidden, most times the message is completely destroyed. This is also true if the file is converted into another format before it reaches its final destination [4].

6

Current State of Steganography: Uses, Limits, & Implications

Most of these techniques can be accomplished without altering the image, music, or video file visually. In addition, these techniques do not require a message to exist. In fact, it may take less time and resources to simply use these techniques without first attempting to detect steganographic content [4]. While destruction is an excellent way to prevent steganographic communication, it does have complications. The first of these concerns robustness. Robustness is not a requirement for steganography, but most tools allow for a certain degree of error to be introduced before the hidden message is lost. Robust steganographic techniques require more severe and costly destruction techniques to be effective. However, there is a tradeoff between robustness and message size, limiting the degree of robustness any particular message can have [5, 7]. Another problem with destruction lies in the difference between “active” and “passive” wardens. In the prisoner’s problem, an active warden has the ability to alter any material passed between the prisoners. A passive warden only has the ability to inspect material. On the decentralized network comprising the Internet, behaving as an active warden is difficult, yet required for destruction to occur. Anti-Steganalysis. There are two main actors in the prisoner’s problem. Most steganalysis takes place from the viewpoint of the warden, attempting to detect or disrupt communication between the prisoners. Antisteganalysis addresses the problem from the viewpoint of the prisoners attempting to defeat the warden. Statistical profiles are just as useful in anti-steganalysis as in steganalysis. Messages can be hidden such that the final product meets a “normal” statistical profile [42, 43]. Similarly, mimicry can be used make information “appear” normal to automated steganalysis tools [4], but may fail visual inspection. An interesting anti-steganalysis concept is diversion or distraction. This is done by hiding extra, unimportant messages inside one file. These extra messages can serve multiple purposes. First, they can be inserted to match a certain statistical profile. It is highly likely only the extra messages will be detected when the file is analyzed, diverting attention away from the actual message. Second, they allow for plausible deniability [43]. For example, consider the prisoner’s problem. Suppose the warden is positive a message is hidden within a file passed between the prisoners. The prisoners could simply reveal the extra, innocuous Sophie Engle, June 2003

messages to the warden, leaving the actual message unharmed and undetected [43]. Like steganography, there is no solid theoretical model for steganalysis. There exists no “magic antisteganography bullet”, nor is there a guarantee that any steganographic algorithm can withstand “clever” steganalysis [4]. Both are caught in a cyclic, evolving battle.

IX.

Conclusion

Steganography is an ancient art which has experienced a surge of growth with the advent of the Internet and digital media. No longer is steganography a method limited to secret communication between spies, or use during war. Tools are now accessible to the general public over the Internet, and require no special training to use. This has several ramifications. The first of these is the increased ability for persons to protect their privacy, or communicate in dangerous situations. The second is the increased ability for criminals and terrorists to communicate undetected by law enforcement. Bans on the technology are not sufficient to eliminate criminal use. Steganalysis, while potentially effective, faces many obstacles in becoming a reliable method of tracking steganographic activity. Steganography and steganalysis are still rapidly growing. As techniques for hiding information improve, so does those for detection. In reality, steganography is part of the same cycle as law enforcement and crime. As the capabilities of law enforcement increase, so do the capabilities of criminals. The only real option is to continue advancing. Continued advancement and research is the only way to prevent the cycle from ending in favor of those who abuse the technology.

X.

Resources

There are several websites which provide a wide-array of information on steganography. The website by Neil Johnson [44] includes several of publications he helped author on the subject, along with an excellent introduction. Various links and tools are listed as well. Petitcolas [45] provides a history on steganography, complete with scans and translations from the first books on the subject. The site includes companies, research groups, and active researchers in the field of steganography. It also includes the Information Hiding Annotated Bibliography [46], which contains over 400 7

Current State of Steganography: Uses, Limits, & Implications

hundred other resources on steganography and information hiding. StegoArchive [47] is another excellent resource which provides a newsletter. The SANS InfoSec Reading Room [48] also provides several white papers on steganography and its link to terrorism.

Acknowledgements I extend a special thanks to Sean Whalen (UC Davis), and my sisters Charlene and Dannielle Engle (Tufts, Northwestern University), for their valuable suggestions and comments regarding this paper.

References [1]

F. Petitcolas, R. Anderson, and M. Kuhn, “Information Hiding – A Survey,” In Proceedings of the IEEE, vol. 87, no. 7, Jul., pp. 1062 – 1078, 1999. (http://www.cl.cam.ac.uk /~fapp2/publications/ieee99-infohiding.pdf)

[2]

M. Bishop, Computer Security; Art and Science, Boston, MA: Addison-Wesley, 2003.

[3]

B. Schneier, Secrets & Lies; Digital Security in a Networked World, New York, NY: Wiley Computer, 2000.

[4]

[5]

[6]

P. Wayner, Disappearing Cryptography; Information Hiding: Steganography and Watermarking, 2nd ed., Boston, MA: Morgan Kaufmann, 2002. N. Johnson, and S. Jajodia, “Steganalysis: The Investigation of Hidden Information,” In Proceedings of IEEE Information Technology Conference, Syracuse, New York, 1998. (http://www.jjtc.com/pub/it98jjgmu.ps) B. Pfitzmann, “Information Hiding Terminology,” In Proceedings of Information Hiding Workshop, Cambridge, England, pp. 347-350, 1996. (http://www.semper.org/sirene /publ/Pfit12_96HideTerm.ps.gz)

[7]

N. Johnson, and S. Jajodia, “Exploring Steganography: Seeing the Unseen,” IEEE Computer, Feb., pp. 26-34, 1998. (http://www.jjtc.com/pub/r2026a.htm)

[8]

G. Simmons, “The Prisoner’s Problem and the Subliminal Channel,” In Proceedings of

Sophie Engle, June 2003

CRYPTO ’83, pp. 51-67, 1983. (http://dsns.csie.nctu.edu.tw/research/crypto/HT ML/PDF/C83/51.PDF) [9]

R. Anderson and F. Petitcolas, “On the Limits of Steganography,” IEEE Journal of Selected Areas in Communications, vol. 16, no. 4, May, pp. 474-481, 1998.

[10] http://linux01.gwdg.de/~alatham/stego.html [11] http://www.outguess.org/ [12] N. Provos and P. Honeyman, “Detecting Steganographic Content on the Internet,” University of Michigan Center for Information Technology Integration, Ann Arbor, MI, Technical Report 01-11, 31 Aug. 2001. (http://www.citi.umich.edu/techreports/reports/ci ti-tr-01-11.pdf) [13] D. Lou and J. Liu, “Steganographic Method for Secure Communications,” Computers & Security, vol. 21, no. 5, Oct., pp. 449-460, 2002. [14] http://www.cl.cam.ac.uk/~fapp2/steganography/ mp3stego/ [15] http://www.spammimic.com/ [16] http://www.wbailer.com/wbstego [17] K. Poulsen, “Program Hides Secret Messages in Executables,” The Register [online], 24 Feb. 2003. (http://www.theregister.co.uk/content/ archive/29449.html) [18] G. Fisk, M. Fisk, C. Papadopoulos, and J. Neil, “Eliminating Steganography in Internet Traffic with Active Wardens,” In Proceedings of the 5th International Workshop on Information Hiding, Noordwijkerhout, Netherlands, Oct., pp. 17-33, 2002. (http://pollux.usc.edu/~chrisp/papers/ihw 2002.pdf) [19] http://www.darkside.com.au/snow/ [20] “Scientists Code Words into DNA,” Wired News [online], 10 Jun. 1999. (http://www.wired.com /news/technology/0,1282,20136,00.html) [21] D. Tapellini, “Teen Science Is Serious Business,” Wired News [online], 16 Mar. 2000.

8

Current State of Steganography: Uses, Limits, & Implications

(http://www.wired.com/news/technology/0,1282, 34983,00.html) [22] http://www.scramdisk.clara.net/ [23] A. McDonald, M. Kuhn, “StegFS: A Steganographic File System for Linux,” In Proceedings of Information Hiding, pp. 463-477, 2000. (http://www.cl.cam.ac.uk/~mgk25/ih99stegfs.pdf ) [24] http://munitions.vipul.net/dolphin.cgi?action=ren der&category=06 [25] http://www.jjtc.com/Security/stegtools.htm [26] N. Hopper, J. Langford, and L. von Ahn, “Provably Secure Steganography,” Crypto 2002, 2002. (http://www.cs.cmu.edu/~biglou/ PSS.pdf) [27] C. Cachin, “An Information-Theoretic Model for Steganography,” In Proceedings of 2nd Workshop on Information Hiding, 1998. (http:// www.zurich.ibm.com/~cca/papers/stego.pdf) [28] N. Provos and P. Honeyman, “Detecting Steganographic Content on the Internet,” University of Michigan Center for Information Technology Integration, Ann Arbor, MI., Technical Report 01-11, 31 Aug. 2001. (http:// www.citi.umich.edu/techreports/reports/citi-tr01-11.pdf) [29] http://niels.xtdnet.nl/stego/ [30] http://www.outguess.org/download.php [31] B. Schneier, Crypto-Gram Newsletter [online], Counterpane Internet Security, 30 Sept. 2001. (http://www.counterpane.com/crypto-gram0109a.html) [32] S. Lau, “An Analysis of Terrorist Groups’ Potential Use of Electronic Steganography,” SANS Reading Room, 18 Feb. 2003. (http://www.sans.org/rr/ paper.php?id=554) [33] D. Takahashi and D. Starkman, “It' s Getting Harder to Hide in Cyberspace,” The Wall Street Journal Online, 4 Apr. 1999. (http://zdnet.com.com/2100-11-514239.html) [34] N. McAllister, “No Scorched-Internet Policy Attacking Technology Will Only Add to the Sophie Engle, June 2003

Toll,” SF Gate [online], 20 Sept. 2001. (http://www.sfgate.com/cgi-bin/article.cgi?file=/ gate/archive/2001/09/20/sigintell.DTL) [35] R. Bagnall, “Reversing the Steganography Myth in Terrorist Operations: The Asymmetrical Threat of Simple Intelligence Dissemination Techniques Using Common Tools,” SANS Information Security Reading Room, 19 Aug. 2002. (http://www.sans.org/rr/paper.php?id=556) [36] D. Zeinalipour-Yazti and T. Folias, “A Quantitative Analysis of the Gnutella Network Traffic,” Riverside: University of California, 17 June 2002. (http://www.cs.ucr.edu/~csyiazti /courses/cs204/project/gnuDC.pdf ) [37] “Spam: By the Numbers,” ePrivacy Group [online], 2003. (http://www.eprivacygroup.com/ pdfs/SpamByTheNumbers.pdf) [38] “Half of all E-Mails are Spam,” BBC News [online], 31 May 2003. (http://news.bbc.co.uk/2/ hi/technology/2950408.stm) [39] D. McCullagh, “Spam Oozes Past Border Patrol,” Wired News [online], 23 Feb. 2001. (http://www.wired.com/news/politics/0, 1283,41860,00.html) [40] J. Leyden, “Website Combines Spam with Encryption,” The Register [online], 15 Dec. 2000. (http://www.theregister.co.uk/content/archive/15 521.html) [41] N. F. Johnson, and S. Jajodia, “Steganalysis of Images Created Using Current Steganography Software,” Lecture Notes in Computer Science, vol. 1525, pp. 273-289, 1998. (http:// www.jjtc.com/ihws98/jjgmu.html) [42] N. Provos, “Defending Against Statistical Steganalysis,” University of Michigan Center for Information Technology Integration, Ann Arbor, MI. Tech. Rep. 01-4, 12 Feb. 2001. (http://www.citi.umich.edu/techreports/reports/ci ti-tr-01-4.pdf) [43] N. Provos, “Probabilistic Methods for Improving Information Hiding,” University of Michigan Center for Information Technology Integration, Ann Arbor, MI. Tech. Rep. 01-1, 31 Jan. 2001. (http://www.citi.umich.edu/techreports/reports/ci ti-tr-01-1.pdf) 9

Current State of Steganography: Uses, Limits, & Implications

[44] http://www.jjtc.com/Steganography/ [45] http://www.cl.cam.ac.uk/~fapp2/steganography/ [46] R. Anderson and F. Petitcolas, “Information Hiding: An Annotated Bibliography,” Cambridge: University of Cambridge, 1999. (http://www.cl.cam.ac.uk/˜fapp2/steganography/ bibliography/) [47] http://www.stegoarchive.com/ [48] http://www.sans.org/rr/catindex.php?cat_id=54

Sophie Engle, June 2003

10

Current State of Steganography: Uses, Limits, & Implications • Appendix A: Recent News Articles Linking Steganography and Terrorism

APPENDIX A: RECENT N EWS ARTICLES L INKING S TEGANOGRAPHY AND T ERRORISM * #

Article Title

[A01] Al-Qaeda Said to be Using Stegged Porn [A02] 9/11 Plot Hidden in E-Porn

Author (if given)

T. C. Greene N. Lathem

[A03]

Coded Pornography, WTC Pictures Found on Terror Cell Computers

[A04]

Al-Qaeda Poised to Strike Hard Via the T. C. Greene Internet

A. Salomon

[A05] Spy Games: Decoding Osama’s Secrets at 16

M. Kumar

Web Site With Area Ties Stirs Terrorism Concern

J. Lynott

[A06]

[A07] Hunt for Hidden Web Messages Goes On

W. Knight

[A08] Hidden Messages: Any There There?”

F. Manjoo

[A09] Watching the Web for Wicked Messages

P. Eng

[A10] Internet Link in Terror Probe

(not provided)

[A11] France Terror Code ‘Breakthrough’

(not provided)

[A12] A Secret Language [A13] Net Surveillance ‘Fatally Flawed’ [A14]

*

Terrorists and Steganography (in CryptoGram Newsletter)

B. Ross (not provided) B. Schneier

Source

(base url)

The Register theregister.co.uk New York Post www.nypost.com ABC News abcnews.go.com The Register theregister.co.uk Hindustan Times hindustantimes.com Times Leader timesleader.com New Scientist newscientist.com Wired News www.wired.com ABC News abcnews.go.com BBC News news.bbc.co.uk BBC News news.bbc.co.uk ABC News abcnews.go.com BBC News news.bbc.co.uk CounterPane counterpane.com

Date

(dd mm yyyy)

Link

(as of 28 05 2003)

12 05 2003

http://www.theregister.co.uk/content/6/30654.html

09 05 2003

http://www.nypost.com/news/worldnews/57502.htm

08 05 2003

http://more.abcnews.go.com/sections/us/dailynews/I TeamInsider_030508.html

07 10 2002

http://www.theregister.co.uk/content/archive/26134. html

04 10 2002 20 07 2002 12 07 2002

http://www.hindustantimes.com/2002/Oct/04/674_7 7069,00310001.htm http://www.timesleader.com/mld/timesleader/news/3 698733.htm http://www.newscientist.com/news/news.jsp?id=ns9 9992543

08 11 2001

http://www.wired.com/news/technology/0,1282,482 35,00.html

11 10 2001

http://more.abcnews.go.com/sections/scitech/DailyN ews/webwatch011011.html

10 10 2001

http://news.bbc.co.uk/2/hi/uk_news/scotland/159090 8.stm

05 10 2001

http://news.bbc.co.uk/2/hi/europe/1580593.stm

04 10 2001

http://more.abcnews.go.com/sections/primetime/dail ynews/primetime_011004_steganography.html

01 10 2001

http://news.bbc.co.uk/2/hi/uk_news/politics/1569874 .stm

30 09 2001

http://www.counterpane.com/crypto-gram0109a.html

Only includes links to articles freely available on the Internet. All links current as of 28 May 2003.

Sophie Engle, June 2003

A11

Current State of Steganography: Uses, Limits, & Implications • Appendix A: Recent News Articles Linking Steganography and Terrorism

# [A15] [A16] [A17] [A18] [A19] [A20] [A21] [A22] [A23] [A24] [A25] [A26] [A27] [A28]

Author

Article Title

(if given)

Source

(base url)

InfoWorld www.infoworld.com New Scientist Massive Search Revels No Secret Code in W. Knight Web Images newscientist.com MSNBC News Tech’s Double-Edged Sword S. Levy www.msnbc.com MSNBC News Coded Communications P. McGrath www.msnbc.com CNN Bin Laden Exploits Technology to Suit His D. Sieberg Needs www.cnn.com SF Gate No Scorched-Internet Policy Attacking N. McAllister Technology Will Only Add To The Toll www.sfgate.com A.E. Cha Washington Post Terrorists’ Online Methods Elusive and J. Krim washingtonpost.com New Scientist Controlling Encryption Will Not Stop W. Knight Terrorists newscientist.com Wired News Anti-Attack Feds Push Carnivor D. McCullagh www.wired.com MSNBC News Did Encryption Empower These Terrorists?” S. Levy www.msnbc.com Wired News Secret Messages Come in .Wavs D. McCullagh www.wired.com D. McCullagh Wired News Bin Laden: Steganography Master?” www.wired.com USA Today Terror Groups Hide Behind Web Encryption J. Kelly www.usatoday.com USA Today Terrorist Instructions Hidden Online J. Kelly www.usatoday.com Opening Encryption Problematic, Experts Say

' Back

Door'

E. M. Abreu

Date

Link

(dd mm yyyy)

(as of 28 05 2003)

26 09 2001

http://archive.infoworld.com/articles/hn/xml/01/09/2 6/010926hnbackdoor.xml

25 09 2001

http://www.newscientist.com/news/news.jsp?id=ns9 9991340

24 09 2001

http://www.msnbc.com/news/629630.asp

21 09 2001

http://www.msnbc.com/news/632358.asp

21 09 2001

http://www.cnn.com/2001/US/09/20/inv.terrorist.sea rch/index.html

20 09 2001

http://www.sfgate.com/cgi-bin/article.cgi?file=/gate/ archive/2001/09/20/sigintell.DTL

19 09 2001

http://www.washingtonpost.com/ac2/wp-dyn?page name=article&contentId=A52687-2001Sep18

18 09 2001

http://www.newscientist.com/news/news.jsp?id=ns9 9991309

12 092001

http://www.wired.com/news/politics/0,1283,46747,0 0.html

11 09 2001

http://www.msnbc.com/news/627390.asp

20 02 2001

http://www.wired.com/news/politics/0,1283,41861,0 0.html

07 02 2001

http://www.wired.com/news/politics/0,1283,41658,0 0.html

05 02 2001

http://www.usatoday.com/tech/news/2001-02-05binladen.htm

05 02 2001

http://www.usatoday.com/tech/news/2001-02-05binladen-side.htm

Sources Include: ABC News, BBC News, CNN, Hindustan Times, MSNBC News, New Scientist, New York Post, The Register, Times Leader, USA Today, and Wired News.

Sophie Engle, June 2003

A12

CURRENT STATE OF STEGANOGRAPHY

Department of Computer Science ... last three years, mostly due to the war on terror. This paper discusses ... II. Terminology. Steganography is often discussed alongside watermarking, fingerprinting, covert channels, subliminal .... information on a computer (ideal for hiding .... be used to provide some degree of deniability.

178KB Sizes 3 Downloads 327 Views

Recommend Documents

CycleGAN, a Master of Steganography
Dec 16, 2017 - strate an intriguing property of the model: CycleGAN learns to “hide” information about a source image into the images it generates in a nearly imperceptible, high- frequency signal. This trick ensures that the generator can recove

Video steganography
Jul 11, 2003 - ing, resampling, conversion from digital to analog and back again, etc. ...... 855-884. Pitas et al., “Applying Signatures on Digital Images,” IEEE.

Video steganography
Jul 11, 2003 - Design of Hidden Transmission,” Radioengineering, vol. 4,. No. 2, Jun. .... Communications—a Tutorial RevieW—Part I,” IEEE Com munications .... [ASSIGN EITHER A 0 OR A I TO EACH CROSS-CORRELATION RESULT.

CenteringPregnancy and the Current State of Prenatal ...
address broader social determinants of health.3,5,10,12,13,14,17. The redesign .... being given to the issue of LBW by researchers, media,30 ... is one of the great impediments to demonstrating its value, ..... What is the prematurity campaign?

steganography Art of Covert Communications, Streetman.pdf ...
Whoops! There was a problem loading more pages. steganography Art of Covert Communications, Streetman.pdf. steganography Art of Covert Communications ...

Current State of Indian Economy - Governance in India
Jun 8, 2011 - Amongst the use based industrial groups, a similar streak of weakness is seen with growth in the capital goods segment, intermediate ...... 16 Sea transport. 290.46. 275.21. 5.54. 1.58. 1.1. 17 Consultancy services. 237.87. 340.65. -30.

Current State of Indian Economy - Governance in India
Jun 8, 2011 - In the fourth quarter of fiscal 2010-11, corporate India turned out a good performance both in terms of sales ... quarter of 2010-11, companies from the services (other than financial) sector saw sales going up by 27.46 percent. ......

Single-cell genome sequencing: current state of the ... - ICB - PGBM
Jan 25, 2016 - siderations and sequence data analysis, and highlight how recent progress is addressing some of the technical challenges associated with ...

pdf steganography techniques
Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. pdf steganography techniques. pdf steganography techniques.

Steganography: Data Hiding in Images
cryptography. Cryptography concentrates more on the security or encryption of data whereas. Steganography aims to defeat the knowledge of encryption of the message. Watermarking is about protecting the content in images;. Steganography is all about c

Implementation of Audio Steganography over Two Level LSB Using ...
IJRIT International Journal of Research in Information Technology, Volume 2, Issue 1, January 2014, Pg:56-63. Anil Soni, IJRIT. 56 ..... Systems Journal, Volume 39 , Issue 3-4, July 2000, pp. 547 – 568. [5] W Bender, D Gruhl, N Morimoto, A Lu, Tech

Current NC State Student Body Statutes (1).pdf
Current NC State Student Body Statutes (1).pdf. Current NC State Student Body Statutes (1).pdf. Open. Extract. Open with. Sign In. Main menu.

Emulsion products and imagery employing steganography
Nov 22, 2005 - AND DIGITAL SPACING OF ORIGINAL DIGITAL SIGNAL OR IMAGE ..... Bors et al., “Embedding Parametric Digital Signatures in. Images ...

Fingerprint Template Protection using Steganography
fingerprint authentication system the key element in ... fingerprint template database using steganography. In this scheme steganography is applied at two levels which increase security of the system and make .... Management(IJSPTM), Vol. 1.

Slide Handler thru Focal Point - Current State
Kanban. Establish. Supermarket vs. Lead Time. LT = ???? (Full). LT = ???? (Steady State). PT = ???? Future State Page 1. Slide Handler (Raw Material) ...

Implementation of Audio Steganography over Two Level LSB ... - IJRIT
The final type of audio steganography worth mentioning is Spectrum Coding. ... D. Gruhl, R. Hwang, F. J. Paiz, S. Pogreb, “Techniques for data hiding”, IBM.

Steganography Using The Twelve Square Substitution Cipher.pdf ...
Loading… Whoops! There was a problem loading more pages. Whoops! There was a problem previewing this document. Retrying... Download. Connect more apps... Steganograph ... n Cipher.pdf. Steganograph ... n Cipher.pdf. Open. Extract. Open with. Sign I

Current Inventory of State Corporations 9th Oct 2013.pdf
Current Inventory of State. Corporations. October 9th 2013. Page 3 of 44. Current Inventory of State Corporations 9th Oct 2013.pdf. Current Inventory of State ...

Show the Mark Gary Post - July 29/30, 2017 I. The Current State of ...
Jul 30, 2017 - For he makes his sun rise on the evil and on the good, and sends rain on the just and on the unjust. For if you love those who love you, what reward do you have? Do not even the tax collectors do the same? Matt. 5:43-46. D. Showing The

Show the Mark Gary Post - July 29/30, 2017 I. The Current State of ...
Jul 30, 2017 - world sees some reality of the oneness of true Christians." Francis Schaeffer, The Mark of the Christian. C. To whom must we show The Mark?

2016 State of the Great Lakes Report - State of Michigan
To support the development of a state designation system for water trails, ...... The web application could serve as a major outreach component to the network ...

ALEX PADILLA | SECRETARY OF STATE | STATE OF CALIFORNIA
Aug 28, 2015 - App.3d 1189, 1201 fn3). The court GRANTS the request of the Secretary for judicial notice of Exhibit 1 (The. Memorandum), of of Exhibits 2-3 ...

ALEX PADILLA | SECRETARY OF STATE | STATE OF CALIFORNIA
Aug 28, 2015 - California's Criminal Justice Realignment Act (“Realignment”) was enacted in April 2011 in order to more effectively manage state prisons and ...

ALEX PADILLA | SECRETARY OF STATE | STATE OF CALIFORNIA ...
Jan 7, 2015 - Each month, the Office of Voting Systems Technology Assessment ... Workshop” at the University of Baltimore on Friday, January 9, 2015.