Um Estudo de Técnicas de Esteganálise em Estego-Imagens com Texto Embutido com LSB/A Study of Stegananalysis Techniques in Stego-Images with Embedded Text with LSB

Lucas Caetano Possatti, Gilberto Neves Sudré Filho, Leandro Colombi Resendo, Jefferson Oliveira Andrade, Karin Satie Komati

Abstract


Este trabalho faz um estudo comparativo de eficiência da ferramenta StegExpose, que reúne os métodos de esteganálise LSB: Chi Square, RS Analysis, Primary Sets, e Sample Pair, além de um método de fusão próprio. Para cada uma das 30 imagens da base de dados, embutiu-se texto usando cinco ferramentas de esteganografia, Stepic, LSBSteg, Steghide, Outguess e F5, e variando o tamanhos da mensagem secreta, em incrementos de 10%. Ao fim dos experimentos constatou-se que o desempenho de um método de esteganálise depende de qual foi a técnica de esteganografia, assim as ferramentas de esteganálise detectaram dados escondidos nas estego-imagens geradas pelo Stepic e LSBSteg, porém não detectaram nas estego-imagens geradas pelo Steghide, Outguess e F5, que usam métodos diferentes do LSB.


Keywords


Esteganografia. LSB. Esteganálise.

References


BOEHM, B. (2014). Stegexpose - A tool for detecting LSB steganography. CoRR, abs/1410.6656, 2014. Disponível em: . Acesso em <01 de jan. de 2018>.

BOEHM, B. (2015). StegExpose. Disponível em: . Acesso em <01 de jan. de 2018>.

CANCELLI, G. (2009). New techniques for steganography and steganalysis in the pixel domain. Tese (Doutorado) — Technische Universität Dresden.

CHANDRAMOULI, R.; KHARRAZI, M.; MEMON, N. (2003). Image steganography and steganalysis: Concepts and practice. In: Springer. International Workshop on Digital Watermarking. [S.l.], 2003. p. 35–49.

CHEDDAD, A. et al. (2010) Digital image steganography: Survey and analysis of current methods. Signal processing, Elsevier, v. 90, n. 3, p. 727–752. Disponível em: .

CHOUDHARY, K. (2012). Image steganography and global terrorism. International Journal of Scientific & Engineering Research, v. 3, n. 4, p. 12.

DAVID, R. (2015). LSB-Steganography. Disponível em: . Acesso em <01 de jan. de 2018>.

DOMNITSER, L. (2007) Spy vs. Spy. Disponível em: . Acesso em <01 de jan. de 2018>.

DUMITRESCU, S.; WU, X.; MEMON, N. (2002). On steganalysis of random LSB embedding in continuous-tone images. In: IEEE. Image Processing. 2002. Proceedings. 2002 International Conference on. [S.l.]. v. 3, p. 641–644.

DUMITRESCU, S.; WU, X.; WANG, Z. (2003). Detection of LSB steganography via sample pair analysis. Signal Processing, IEEE Transactions on, IEEE, v. 51, n. 7, p. 1995–2007, 2003.

FAWCETT, T. (2006). An introduction to ROC analysis. Pattern recognition letters, Elsevier, v. 27, n. 8, p. 861–874,.

FRIDRICH, J.; GOLJAN, M. (2002). Practical steganalysis of digital images: state of the art. In: International Society for Optics and Photonics. Electronic Imaging. [S.l.], 2002. p. 1–13.

FRIDRICH, J.; GOLJAN, M.; DU, R. (2001a). Reliable detection of LSB steganography in color and grayscale images. In: ACM. Proceedings of the 2001 Workshop on Multimedia and security: new challenges. [S.l.]. p. 27–30.

FRIDRICH, J.; GOLJAN, M.; DU, R. (2001b). Steganalysis based on JPEG compatibility. In: International Society for Optics and Photonics. ITCom 2001: International Symposium on the Convergence of IT and Communications. [S.l.]. p. 275–280.

FRIDRICH, J.; GOLJAN, M.; HOGEA, D. (2002a). Attacking the Outguess. In: Proceedings of the ACM Workshop on Multimedia and Security. Vol. 2002. Juan-les-Pins, France.

FRIDRICH, J.; GOLJAN, M.; HOGEA, D. (2002b). Steganalysis of JPEG images: Breaking the F5 algorithm. In: SPRINGER. International Workshop on Information Hiding. [S.l.]. p. 310–323.

GOLJAN, M.; FRIDRICH, J. J.; DU, R. (2001). Distortion-free data embedding for images. In: Srpinger. International Workshop on Information Hiding. [S.l.]. p. 27–41.

HETZL, S. (2002). Steghide. Disponível em: . Acesso em <01 de jan. de 2018>.

NSTC, (2006). Federal Plan for Cyber Security and Information Assurance Research and Development. National Science and Technology Council, Washington DC. Disponível em: http://www.au.af.mil/au/awc/awcgate/nitrd/fed_plan_csia_rese.pdf. Acesso em <01 de jan. de 2018>.

JAMES, G. et al. (2013). An introduction to statistical learning. [S.l.]: Springer. New York.

JOHNSON, N. F. (2012). Steganography Software. Disponível em: . Acesso em <01 de jan. de 2018>.

JULIO, E. P.; BRAZIL, W. G.; ALBUQUERQUE, C. V. N. (2007). Esteganografia e suas aplicações. Livro de Minicursos do SBSEG. Rio de Janeiro: Sociedade Brasileira de Computação, v. 7, p. 54–102, 2007.

KHARRAZI, M.; SENCAR, H. T.; MEMON, N. (2006). Improving steganalysis by fusion techniques: a case study with image steganography. In: Transactions on Data Hiding and Multimedia Security I. [S.l.]: Springer. p. 123–137.

MARÇAL, A. R.; PEREIRA, P. R. (2005). A steganographic method for digital images robust to RS steganalysis. In: Springer. International Conference Image Analysis and Recognition. [S.l.], 2005. p. 1192–1199.

MAZURCZYK, W. et al. (2016). Information Hiding in Communication Networks: Fundamentals, Mechanisms, Applications, and Countermeasures. Wiley, 2016. IEEE Press Series on Information and Communication Networks Security. ISBN 9781118861691. Disponível em: .

MENA, M. E. Emotion recognition from speech signals. Tese (Doutorado) — Universitat Politècnica de Catalunya, 2012.

MICHE, Y. (2010). Developing fast machine learning techniques with applications to steganalysis problems. Tese (Doutorado) — Institut National Polytechnique de Grenoble-INPG, 2010.

NAIR, T. et al. (2012). Genetic algorithm to make persistent security and quality of image in steganography from RS analysis. arXiv preprint arXiv:1204.2616, 2012.

PETITCOLAS, F. A.; ANDERSON, R. J.; KUHN, M. G. (1999). Information hiding-a survey. Proceedings of the IEEE, IEEE, v. 87, n. 7, p. 1062–1078, 1999.

PROVOS, N. (2001). Defending against statistical steganalysis. In: Usenix security symposium. [S.l.: s.n.], 2001. v. 10, p. 323–336.

PROVOS, N.; HONEYMAN, P. (2003). Hide and seek: An introduction to steganography. IEEE Security & Privacy, IEEE, v. 1, n. 3, p. 32–44, 2003.

QIAO, T. et al. (2015). Steganalysis of Jsteg algorithm using hypothesis testing theory. EURASIP Journal on Information Security, v. 2015, n. 1, p. 2, 2015. ISSN 1687-417X. Disponível em: .

RAJAN, A. N. et al. (2013). Block mean modulation: An effective and robust image steganographic technique in the spatial domain. International Journal of Computer Applications, Foundation of Computer Science, v. 73, n. 19.

SHACHTMAN, N. (2010). FBI: Spies Hid Secret Messages on Public Websites. 2010. Disponível em: . Acesso em <01 de jan. de 2018>.

SIMMONS, G. J. (1984). The prisoners’ problem and the subliminal channel. In: . Advances in Cryptology: Proceedings of Crypto 83. Boston, MA: Springer US, 1984. p. 51–67. ISBN 978-1-4684-4730-9. Disponível em: .

SUJATHA, P. (2013). Image steganalysis using artificial neural networks. Tese (Doutorado) — Vels University.

TEAM, O. D. (2017). OpenCV (Open Source Computer Vision Library). 2017. Disponível em: . Acesso em <01 de jan. de 2018>.

WENDZEL, S. et al. (2014). Hidden and uncontrolled–on the emergence of network stegaographic threats. In: ISSE 2014 Securing Electronic Business Processes. [S.l.]: Springer. p. 123–133.

WESTFELD, A. (2001). F5 - a steganographic algorithm. In: Springer. International Workshop on Information Hiding. [S.l.]. p. 289–302.

WESTFELD, A.; PFITZMANN, A. (1999). Attacks on steganographic systems. In: Springer. Information Hiding. [S.l.]. p. 61–76.




DOI: https://doi.org/10.34117/bjdv5n10-251

Refbacks

  • There are currently no refbacks.