A Study on Countermeasures against Steganography: an Active Warden Approach

نویسندگان

  • Qilin Qi
  • Yaoqing Yang
  • Dongming Peng
چکیده

Digital steganography is a method used for hiding information in digital images. It can be used for secure communication. There have been many robust digital steganography methods invented in recent decades. The steganographic message can be inserted in multimedia cover signal such as audio, image and video. However, this technique also may be used by malicious users to transmit dangerous information through the Internet beyond the control of security agencies. How to detect and/or block potentially dangerous information transmission on the Internet through billions of multimedia files while not affecting innocent multimedia communications becomes a challenging problem. Existing steganalysis methods or steganography attacking methods which are mostly passive methods cannot be used for analyzing a large volume of digital images in a short time. In addition those passive methods also cannot be generic enough to defeat various steganographic algorithms on the Internet. In this paper, we propose an active attacking model to defeat the rising threat of steganography. The active protection mechanism is proved to be more effective to protect the integrity of the multimedia data. Based on the active attacking model, a steganography attacking method which is not limited by the types of the steganography methods is proposed. The proposed method can process the digital multimedia data to remove the potential dangerous hidden information while keeping the digital data in a high visual quality. This attack method is based on a proposed transform called Discrete Spring Transform. Some implementations of the Discrete Spring Transform in audio, image and video signals are proposed. The proposed transform causes that the numerical values of the image to be changed dramatically and then the hidden information is not able to be recovered, while at the same time the visual image quality can be maintained. This method is a generic approach for multimedia signals and contains theoretical advantages over similar methods. Our experimental results have demonstrated that the quality of the multimedia signal can be guaranteed while the stego-data are considerably destroyed. iv To Mingrun, my parents and grandparents. v ACKNOWLEDGMENTS I would like to express my sincere gratitude to my advisor Dr. Dongming Peng and Dr. Yaoqing Yang for the continuous support of my Master study and research, for his patience, motivation, enthusiasm, and immense knowledge. Besides my advisors, I would like to thank the rest of my thesis committee: Dr. and hard questions. Last but not the least, I would like to …

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

On Public-Key Steganography in the Presence of an Active Warden

The so-called prisoners’ problem, in which two individuals attempt to communicate covertly without alerting a “warden” who controls the communications channel, has taken a number of forms, adorned with various assumptions or requirements which make the problem more or less difficult. One assumption which makes the problem considerably more managable is that the participants are allowed to share...

متن کامل

Informed Stego-schemes in Active Warden Context : Tradeoff between Undetectability, Capacity and Resistance

The prime goal of steganography is undetectability. It means that the warden of the Simmons prisoners’ problem cannot decide if the embedded message – sent by Alice to Bob – is present or not in the stego-content. This problem of evaluating whether the warden is able to detect the presence of a hidden message or not has been formalized based on the statistics of the stego-signal. In this paper,...

متن کامل

Analysis of LSB based image steganography techniques

But practical implementation of the definition is not feasible, so pragmatic approach would be to make the algorithm as strong as possible. Steganography is most widely formulated in terms of the prisoner’s problem where Alice and Bob are two inmates who wish to communicate in order to hatch an escape plan. However, all communication between them is examined by the warden, Wendy, who will put t...

متن کامل

Stego-Encoding with Error Correction Capability

Although a proposed steganographic encoding scheme can reduce distortion caused by data hiding, it makes the system susceptible to active-warden attacks due to error spreading. Meanwhile, straightforward application of error correction encoding inevitably increases the required amount of bit alterations so that the risk of being detected will increase. To overcome the drawback in both cases, an...

متن کامل

Eliminating Steganography in Internet Traffic with Active Wardens

Active wardens have been an area of postulation in the community for nearly two decades, but to date there have been no published implementations that can be used to stop steganography as it transits networks. In this paper we examine the techniques and challenges of a high-bandwidth, unattended, real-time, active warden in the context of a network firewall. In particular, we concentrate on str...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016