SmartSearch steganalysis

نویسندگان

  • Jeffrey A. Bloom
  • Rafael Alonso
چکیده

There are two primary challenges to monitoring the Web for steganographic media: finding suspect media and examining those found. The challenge that has received a great deal of attention is the second of these, the steganalysis problem. The other challenge, and one that has received much less attention, is the search problem. How does the steganalyzer get the suspect media in the first place? This paper describes an innovative method and architecture to address this search problem. The typical approaches to searching the web for covert communications are often based on the concept of “crawling” the Web via a smart “spider.” Such spiders find new pages by following ever-expanding chains of links from one page to many next pages. Rather than seek pages by chasing links from other pages, we find candidate pages by identifying requests to access pages. To do this we monitor traffic on Internet backbones, identify and log HTTP requests, and use this information to guide our process. Our approach has the advantages that we examine pages to which no links exist, we examine pages as soon as they are requested, and we concentrate resources only on active pages, rather than examining pages that are never viewed.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Detection of perturbed quantization (PQ) steganography based on empirical matrix

Perturbed Quantization (PQ) steganography scheme is almost undetectable with the current steganalysis methods. We present a new steganalysis method for detection of this data hiding algorithm. We show that the PQ method distorts the dependencies of DCT coefficient values; especially changes much lower than significant bit planes. For steganalysis of PQ, we propose features extraction from the e...

متن کامل

نهان‌کاوی صوت مبتنی بر همبستگی بین فریم و کاهش بازگشتی ویژگی

Dramatic changes in digital communication and exchange of image, audio, video and text files result in a suitable field for interpersonal transfers of hidden information. Therefore, nowadays, preserving channel security and intellectual property and access to hidden information make new fields of researches naming steganography, watermarking and steganalysis. Steganalysis as a binary classifica...

متن کامل

Steganalysis of Colored JPEG Images

Images, especially colored JPEG images, are increasingly being used as cover by many steganography techniques. Steganalysis detects the presence of message embedded by steganography techniques. Many authors have given different steganalysis techniques which differ mainly on the feature sets being used. In this paper we are comparing feature sets of six of these steganalysis techniques for multi...

متن کامل

Eigenvalues-based LSB steganalysis

So far, various components of image characteristics have been used for steganalysis, including the histogram characteristic function, adjacent colors distribution, and sample pair analysis. However, some certain steganography methods have been proposed that can thwart some analysis approaches through managing the embedding patterns. In this regard, the present paper is intended to introduce a n...

متن کامل

Review of Various Steganalysis Techniques

Steganography and steganalysis received a great deal of attention from media and law enforcement. Many powerful and robust methods of steganography and steganalysis have been developed. In this paper we are considering the methods of steganalysis that are to be used for this processes. Paper giving some idea about the steganalysis and its method. Keywords— Include at least 5 keywords or phrases

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003