Integrated Method for Detection of Unknown Steganographic Content

This article concerns the presentation of an integrated method for detection of steganographic content embedded by new unknown programs. The method is based on data mining and aggregated hypothesis testing. The article contains the theoretical basics used to deploy the proposed detection system and the description of improvement proposed for the basic system idea. Further main results of experiments and implementation details are collected and described. Finally example results of the tests are presented.

Authors:



References:
[1] Robert N. McDonough and Anthony D. Whalen, Detection of Signal in
Noise, Academic Press, 1995.
[2] J. Fridrich, J., Goljan, "Practical Steganalysis of Digital Images - State of
the Art", Proceedings of SPIE Photonics West 2002: Electronic Imaging,
Security and Watermarking of Multimedia Contents IV, 4675:1-13,
2002.
[3] A. Westfield, A. Pfitzman, "Attacks on Steganographic Systems",
Information Hiding, LNCS 1768, pp. 61-76, Springer-Verlag Berlin
Heidelberg, 1999.
[4] A. Westfeld and A. Pfitzmann, "Attacks on steganographic systems", 3rd
International Workshop on Information Hiding, IH'99 Dresden
Germany, October Proceedings, Computer Science 1768. pp. 61- 76,
1999.
[5] A. Westfeld, A., Pfitzmann, A., "Attacks on Steganographic Systems -
Breaking the Steganographic Utilities EzStego, Jsteg, Steganos, and STools
- and Some Lessons Learned", Lecture Notes in Computer
Science, 1768:61-75, 2000.
[6] N. Provos, P. Honeyman , "Detecting Steganography Content on the
Internet", CITI technical report, vol. 1, pp. 01-11, August 2001.
[7] R.J. Anderson and F.A.P. Petitcolas, "On the limits of steganography",
IEEE Journal of Selected Areas in Communications, Special Issue on
Copyright and Privacy Protection, May 1998.
[8] H. Farid, "Detecting Steganographic Message in Digital Images", Report
TR2001-412, Dartmouth College, Hanover, NH, 2001.
[9] H. Farid, "Detecting Steganographic Messages in Digital Images",
Technical Report, Hanover, NH: Dartmouth College, 2001.
[10] N. F. Johnson and S. Jajodia, "Steganalysis of Images Created Using
Current Steganography Software", Lecture Notes in Computer Science,
vol.1525, Springer-Verlag, Berlin, 1998, pp. 273 -289.
[11] Magdalena Pejas, "Detecting Steganographic Transmissions", Software
Developer's Journal 9/2005.
[12] Magdalena Pejas, "Aggregated Hypothesis Testing for Steganalysis",
Transactions on Enformatika, Systems Sciences and Engineering 8
October 2005, 2005 International Academy of Sciences, ISBN 975-
98458-7-3.