Please help me in s...
 
Notifications
Clear all

Please help me in steganography

8 Posts
3 Users
0 Reactions
872 Views
(@newrule)
Active Member
Joined: 15 years ago
Posts: 5
Topic starter  

Hi guys..regrading to steganography…I know there are lots of techniques..recently one of my subject requires me to do one project for embedding message in digital image steganography..

the thing is I need to do an analysis to measure the best digital steganography techniques. That's a problem for me..so is there any tool to measure those techniques…please help me guys!!!!


   
Quote
Welshie
(@welshie)
Eminent Member
Joined: 16 years ago
Posts: 21
 

Hi newrule,

There are different techniques and tools, whether you are hiding (or looking for hidden data) in images, sound, video, DNS, TCP/IP, UDP, ICMP, HTML, CSS, Spam, ADS, GPX, ZIP, Barcodes, Rainbow Binary Tables, C64 Audio tapes…

I cannot advise on a resource for 'measuring techniques', I would suggest this would be your project, to use various hiding techniques/tools against the tools/techniques for detection, to determine 'best techniques'.

Good luck with it.

J.

Some links/references

Johnson, Neil F.
Steganography Tool Matrix.
http//www.jjtc.com/Steganography/toolmatrix.htm

Steganography Analysis and Research Center.
http//www.sarc-wv.com/

Stegdetect, Stegbreak and Xsteg.
http//www.outguess.org/detection.php

Kahn, David.
The Codebreakers – The Story of Secret Writing.
The Macmillan Company, 1967.

http//www.forensicfocus.com/index.php?name=Forums&file=viewtopic&t=3986

http//www.forensicfocus.com/index.php?name=Forums&file=viewtopic&p=6528683

http//www.forensicfocus.com/index.php?name=Forums&file=viewtopic&t=4099


   
ReplyQuote
(@seanmcl)
Honorable Member
Joined: 19 years ago
Posts: 700
 

the thing is I need to do an analysis to measure the best digital steganography techniques.

How do you define "the best"? Undetectable? Capable of embedding the greatest amount of data?

The goal of steganography is to make the detection of the existence of the embedded data difficult or impossible. The most effective systems for steganography take into account the methods employed by the currently available steganalysis tools and "work around" these by sacrificing density for obscurity. The use of those systems can be pratically impossible to detect unless you have the original image or other images from the same camera with which to compare.

Furthermore, as Welshie has noted, there are many different media which can be used for steganography. Thus, a comparison of all tools which can be used for each medium would be a pretty exhaustive assignment.

I'd be tempted to pick one or a couple of media (JPEG, BMP, whatever), look at the tools, available to embed steganograohy in these, and then look at the available detection systems (some of which are unavailable except as commercial products).

You might also look at the prior submissions for the DC3 challenge which has included numerous steganography examples in prior years. These will give you an idea of how difficult detection can be using available technologies.


   
ReplyQuote
(@newrule)
Active Member
Joined: 15 years ago
Posts: 5
Topic starter  

my dear walshie…you said "There are different techniques and tools, whether you are hiding (or looking for hidden data) in images, sound, video, DNS, TCP/IP, UDP, ICMP, HTML, CSS, Spam, ADS, GPX, ZIP, Barcodes, Rainbow Binary Tables, C64 Audio tapes…"

could you read twice my statement…. "Hi guys..regrading to steganography…I know there are lots of techniques..recently one of my subject requires me to do one project for embedding message in digital image steganography.."

I already emphasized on digital image…..I want to know the list of digital image steganography techniques..


   
ReplyQuote
(@seanmcl)
Honorable Member
Joined: 19 years ago
Posts: 700
 

I already emphasized on digital image…..I want to know the list of digital image steganography techniques..

If you had followed the links embedded in his message you would have found exactly what you were asking for.


   
ReplyQuote
Welshie
(@welshie)
Eminent Member
Joined: 16 years ago
Posts: 21
 

Hi newrule,

You are most correct as I have provided an introduction giving a very short overview of some Stego techniques.

However, and as Sean has pointed out, the actual selection of links and references given will help and assist you in finding the relevant information you seek.

I suggest you re-examine the first link
Johnson, Neil F.
Steganography Tool Matrix.
http//www.jjtc.com/Steganography/toolmatrix.htm

It is One of the best current references in the public domain for listing Stego tools. The righthand column will be of particular interest to you, as it states "Steg type" from which you can determine if it is relevant to digital images. Please note that this is not an exhaustive list, as there are new, different and unlisted tools, however this is something you may further research.

I would be most interested in your findings and look forward to your updates regarding Steganography.

Good luck with it.


   
ReplyQuote
(@newrule)
Active Member
Joined: 15 years ago
Posts: 5
Topic starter  

tq so much guys…let me proceed with some articles first and I'll come with some questions. lol


   
ReplyQuote
(@newrule)
Active Member
Joined: 15 years ago
Posts: 5
Topic starter  

hi guys..these are my findings from those articles…

steganography —-

Images

- transform domain
1.JPEG compression
2..spread spectrum
3. patchwork

-image domain
1.LSB in BMP
2.LSB in GIF
3.patchwork
4.spread spectrum

from the test that been made by them…

LSB (BMP) | LSB (GIF)| JPEG compression|patchwork|spread spectrum

invisibility High* | Medium* | High | High| High

payload High | Medium | Medium | Low | Medium
capacity

Robustness Low | Low | Medium | High | High
againts
statistical
attack

independent Low | Low | Low | Low | Low
of file format

unsuspicious Low Low High High High
file

* is depends on cover image

u guys could refer one of the paper here
http//martinolivier.com/open/stegoverview.pdf

I think I pretty clear on those techniques that involve in steganography images..—correct me if I gave the wrong info…

so I come to the core issue…from where that i could get such data that could proof those results are precise (refer to the table) ..what kind of tool that I could use to do the experiments on the images?

**My dear supervisor must ask all these questions to me…

I hope you guys could help me on these questions…


   
ReplyQuote
Share: