Download presentation
Presentation is loading. Please wait.
Published byDominick Lynch Modified over 9 years ago
1
IEEE-WVU, Anchorage - 2008 1 Steg in the Real World Two examples that move the work of steganalysis out of the lab –The massive data survey of Provos et al. 2003 –The Stegi@work distributed steganalysis framework
2
IEEE-WVU, Anchorage - 2008 2 Steg on the Web? Provos et al. 2003* 2 million JPEG images from 1 million JPEG images from Usenet –Images restricted in size between 20KB and 400KB stegdetect –Identified potential hidden content in 1% of the images *N. Provos and P. Honeyman, IEEE Security and Privacy Magazine, May/June 2003
3
IEEE-WVU, Anchorage - 2008 3 Steg on the Web? Percentage of (false) positives –JPHide “detected” most often TestEbayUsenet Jsteg0.0030.007 JPHide1.02.1 Outguess0.10.14
4
IEEE-WVU, Anchorage - 2008 4 Steg on the Web? Verifying hidden content –Stegbreak Dictionary attack against Jsteg, JPHide, and Outguess –Ebay: multi-lingual dictionary of 850,000 words –Usenet: short PIN numbers and pass phrases; 1.8 millions words
5
IEEE-WVU, Anchorage - 2008 5 Steg on the Web? Performance of Stegbreak SystemOne Image (words/second) Fifty Images (words/second) JPHide4,5008,700 Outguess 0.13b18,00034,000 Jsteg36,00047,000 1.2 GHz PIII JPHide: 10 days Outguess: ? Jsteg: 8 days
6
IEEE-WVU, Anchorage - 2008 6 Towards a larger steganalysis framework Disconcert - a distributed computing framework for loosely coupled workstations –Distribute indices into stegbreak’s dictionary Ebay: 60 nodes, 200,000 per second for JPHide Usenet: 230 nodes, 870,000 keys per second
7
IEEE-WVU, Anchorage - 2008 7 Is anything out there??? Conclusions of Provos et al. 2003 –All steganographic systems users carefully choose passwords that are not susceptible to dictionary attacks –Images from sources not analyzed carry steganographic content –Images carried content embedded by tools that stegdetect does not consider –Messages are too small for detection
8
IEEE-WVU, Anchorage - 2008 8 Distributed Steganalysis: Stegi@Work Objective –The development of an architecture for an extensible distributed application for steganalsyis User alerts Facility for content destruction of quarantine SOA to facilitate the inclusion of new and improved steganalysis algorithms
9
IEEE-WVU, Anchorage - 2008 9 Overall Architecture
10
IEEE-WVU, Anchorage - 2008 10 Stegi@Work Communications
11
IEEE-WVU, Anchorage - 2008 11 Flexible Network Architectures
12
IEEE-WVU, Anchorage - 2008 12 Flexible Network Architectures
13
IEEE-WVU, Anchorage - 2008 13 User Interface
14
IEEE-WVU, Anchorage - 2008 14 Steganalysis Support Publicly available wrapped tools –Stegdetect (JPEG) –Digital Invisible Ink Toolkit (BMP, PNG) Detects LSB methods –Custom “supertool” Detects via signatures: »In Plain View, S-Tools, Mandelsteg, Hide and Seek v.4 And v.5, Hide4PGP Statistical tests: » 2 and 2 histogram
15
IEEE-WVU, Anchorage - 2008 15 Steganalysis Tool Wrapping Support Full featured tool wrapping API –Tool wrapping support for C/C++, Java, and Matlab programs –Network communication with XML messages between worker clients and Stegi@Work server
16
IEEE-WVU, Anchorage - 2008 16 Implementation Details Entire framework written in Java 5 –Tool support in a variety of languages –JNI low-level system support for Linux and Windows –JBOSS backend server –EJB 3 Object Model
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.