Abstract
Methods for embedding secret data are more sophisticated than their ancient predecessors, but the basic principles remain unchanged.
- Adee, S. Spy vs. spy. IEEE Spectrum. (Aug. 2008); http://spectrum.ieee.org/computing/-software/spy-vs-spy/1.Google Scholar
- Alperovitch, D. Revealed: Operation Shady RAT. McAfee, 2011; http://www.mcafee.com/-us/resources/white-papers/wp-operation-shady-rat.pdf.Google Scholar
- Alureon trojan uses steganography to receive commands. (Sept. 2011); http://-www.virusbtn.com/news/2011/09_26.Google Scholar
- Analysis, S. and Center, R. World's largest digital steganography database expands again. SARC Press Release (Feb. 2012); http://www.sarc-wv.com/news/press_releases/-2012/safdb_v312.aspx.Google Scholar
- Anderson, R. Stretching the limits of steganography. Information Hiding. Springer, 1996, 39--48. Google ScholarDigital Library
- Anderson, R. Needham, R. and Shamir, A. The steganographic file system. Information Hiding. Springer, 1998, 73--82.Google Scholar
- Bencsáth, B., Pék, G., Buttyán, L. and Félegyházi, M. Duqu: A Stuxnet-like malware found in the wild, (2011); http://www.crysys.hu/publications/files/-bencsathPBF11duqu.pdf.Google Scholar
- Bender, W., Gruhl, D., Morimoto, N. and Lu, A. Techniques for data hiding. IBM Systems Journal 35, 3&4 (1996), 313--336. Google ScholarDigital Library
- Bennett, K. Linguistic steganography: Survey, analysis, and robustness concerns for hiding information in text (2004).Google Scholar
- Bergmair, R. A comprehensive bibliography of linguistic steganography. In Proceedings of the SPIE Intl Conf. on Security, Steganography, and Watermarking of Multimedia Contents, 2007.Google ScholarCross Ref
- Bryant, R., Ed. Investigating Digital Crime. John Wiley & Sons, 2008, 1--24.Google Scholar
- Castiglione, A. De Santis, A., Fiore, U. and Palmieri, F. An asynchronous covert channel using SPAM. Computers & Mathematics with Applications, 2011. Google ScholarDigital Library
- Cheddad, A., Condell, J., Curran, K. and Mc Kevitt, P. Digital image steganography: Survey and analysis of current methods. Signal Processing 90, 3 (2010), 727--752. Google ScholarDigital Library
- Chen, T. Stuxnet, the real start of cyber warfare? IEEE Network 24, 6 (2010), 2--3. Google ScholarDigital Library
- Cox, I. Digital Watermarking and Steganography. Morgan Kaufmann, 2008. Google ScholarDigital Library
- De Sélincourt, A. Herodotus: The Histories. Penguin, 1954.Google Scholar
- El-Khalil, R. and Keromytis, A. Hydan: Hiding information in program binaries. Information and Communications Security, (2004), 287--291.Google ScholarCross Ref
- Falliere, N., Murchu, L. and Chien, E. W32.Stuxnet dossier. White paper. Symantec Corp., Security Response, 2011.Google Scholar
- Fra̧czek, W., Mazurczyk, W. and Szczypiorski, K. Hiding information in Stream Control Transmission Protocol. Computer Communications 35, 2 (2012), 159--169. Google ScholarDigital Library
- Fridrich, J. Steganography in Digital Media---Principles, Algorithms, and Applications. Cambridge University Press, 2010. Google ScholarDigital Library
- Goodin, D. Duqu spawned by 'well-funded team of competent coders.' World's first known modular rootkit does steganography, too. The Register, Nov. 2011.Google Scholar
- Grabska, I. and Szczypiorski, K. Steganography in LTE. In Proc. of Intl. Workshop on Cyber Crime, (San Jose, May 2014).Google Scholar
- Gross, M.J. Exclusive: Operation shady RAT---Unprecedented cyber-espionage campaign and intellectual-property bonanza. Vanity Fair (Aug. 2011).Google Scholar
- Hayati, P., Potdar, V. and Chang, E. A survey of steganographic and steganalytic tools for the digital forensic investigator. In Workshop of Information Hiding and Digital Watermarking, (Canada, 2007).Google Scholar
- Jankowski, B., Mazurczyk, W., and Szczypiorski, K. PadSteg: Introducing inter-protocol steganography. Telecommunication Systems: Modeling, Analysis, Design and Management 52, 2 (2013), 1101--1111.Google Scholar
- Johnson, N. and Jajodia, S. Steganalysis of images created using current steganography software. Information Hiding. Springer, 1998, 273--289.Google Scholar
- Kahn, D. The history of steganography. Information Hiding. Springer, 1996, 1--5. Google ScholarDigital Library
- Kellen, T. Hiding in plain view: Could steganography be a terrorist tool? SANS Institute InfoSec Reading Room, 2001; http://www.sans.org/reading_room/whitepapers/-stenganography/hiding-plain-view-steganography-terrorist-tool_551.Google Scholar
- Kelley, J. Terror groups hide behind Web encryption. USA Today (May 2001); http://-www.usatoday.com/tech/news/2001-02-05-binladen.htm.Google Scholar
- Kopiczko, P., Mazurczyk, W. and Szczypiorski, K. StegTorrent: A steganographic method for P2P files sharing service. In Proc. of Intl. Workshop on Cyber Crime, (San Francisco, CA, May 2013). Google ScholarDigital Library
- Lampson, B. A note on the confinement problem. Commun. ACM 16, 10 (Oct. 1973), 613--615. Google ScholarDigital Library
- Lau, H. The truth behind the Shady RAT. McAffe report, (Aug. 2011); http://-www.symantec.com/connect/blogs/truth-behind-shady-rat.Google Scholar
- Lubacz, J., Mazurczyk, W. and Szczypiorski, K. Vice over IP. IEEE Spectrum 47, 2 (2010), 42--47. Google ScholarDigital Library
- Markey, H. and Antheil, G. Secret communication system. Aug. 11 1942, US Patent 2,292,387.Google Scholar
- Mazurczyk, W., Karaś, M. and Szczypiorski, K. SkyDe: A Skype-based steganographic method. International J. Computers, Communications & Control 8, 3 (June 2013), 389--400.Google Scholar
- Mazurczyk, W., Szaga, P. and Szczypiorski, K. Using transcoding for hidden communication in IP telephony. Multimedia Tools and Applications (2011), 1--27; DOI 10.1007/s11042-012-1224-8.Google Scholar
- Nagaraja, S., Houmansadr, A., Piyawongwisal, P., Singh, V. Agarwal, and Borisov, N. Stegobot: A covert social network botnet. Information Hiding. Springer, 2011, 299--313. Google ScholarDigital Library
- Networking and Information Technology Research and Development Program. I.W.G. on Cyber Security and I. Assurance. Federal Plan for Cyber Security and Information Assurance Research and Development, (Apr. 2006); http://www.nitrd.gov/pubs/csia/-csia_federal_plan.pdf.Google Scholar
- Pang, H., Tan, K. and Zhou, X. Stegfs: A steganographic file system. In Proceedings of the 19th Intl. Conf. on Data Engineering. IEEE, 2003, 657--667.Google ScholarCross Ref
- Petitcolas, F., Anderson, R. and Kuhn, M. Information hiding---A survey. In Proceedings of the IEEE 87, 7 (1999), 1062--1078.Google ScholarCross Ref
- Ristenpart, T., Tromer, E., Shacham, H. and Savage, S. 'Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds.' In Proceedings of the 16th ACM Conference on Computer and Communications Security. ACM, 2009, 199--212. Google ScholarDigital Library
- Rowland, C. Covert channels in the TCP/IP protocol suite. First Monday 2, 5 (1997).Google ScholarCross Ref
- Rudin, B. and Tanner, R. Making Paper: A Look into the History of an Ancient Craft. Rudin, 1990.Google Scholar
- Shachtman, N. FBI: Spies hid secret messages on public websites. Wired (June 2010); http://www.wired.com/dangerroom/2010/06/alleged-spies-hid-secret-messages-on-public-websites/.Google Scholar
- Sieberg, D. Bin Laden exploits technology to suit his needs. CNN (Sept. 2001); http://-edition.cnn.com/2001/US/09/20/inv.terrorist.search/.Google Scholar
- Simmons, G. The prisoners' problem and the subliminal channel. In Proceedings of Crypto '83: Advances in Cryptology (1984), 51--67.Google ScholarCross Ref
- Singh, S. The Code Book: The Secret History of Codes and Codebreaking. Fourth Estate, 2000.Google Scholar
- Smith, D. Number games and number rhymes: The great number game of dice. The Teachers College Record 13, 5 (1912), 39--53.Google Scholar
- Srivastava, K. Congress wants answers on world's largest security breach. Aug. 2011; http://www.mobiledia.com/news/102480.html.Google Scholar
- Stier, C. Russian spy ring hid secret messages on the Web. (July 2010); http://-www.newscientist.com/article/dn19126-russian-spy-ring-hid-secret-messages-on-the-web.html.Google Scholar
- Symantec. W32.Duqu---The precursor to the next Stuxnet, (Nov. 2011); http://-www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/-w32_duqu_the_precursor_to_the_next_stuxnet_research.pdf.Google Scholar
- Szczypiorski, K. Steganography in TCP/IP networks. In Proceedings of State of the Art and a Proposal of a New System-HICCUPS. Institute of Telecommunications' seminar, Warsaw University of Technology, Poland, 2003.Google Scholar
- Szczypiorski, K. and Mazurczyk, W. Steganography in IEEE 802.11 OFDM symbols. Security and Communication Networks 3 (2011), 1--12.Google Scholar
- Wang, Y. and Izquierdo, E. High-capacity data hiding in MPEG-2 compressed video. In Proceeding of the 9th Intl. Workshop on Systems, Signals and Image Processing (Manchester, U.K., 2002), 212--218.Google ScholarCross Ref
- Wayner, P. Disappearing Cryptography---Information Hiding: Steganography & Watermarking. Morgan Kaufmann, 2009. Google ScholarDigital Library
- White, W. The Microdot: History and Application. Phillips Publications, 1992.Google Scholar
- Williams, C. Russian spy ring bust uncovers tech toolkit The Register (June 2010); http://www.theregister.co.uk/2010/06/29/spy_ring_tech/.Google Scholar
- Xu, C., Ping, X. and Zhang, T. Steganography in compressed video stream. In Proceedings of the First International Conference on Innovative Computing, Information and Control. IEEE, 2006, 269--272. Google ScholarDigital Library
- Zimmermann, H. OSI reference model---the ISO model of architecture for open systems interconnection. IEEE Transactions on Communications 28, 4 (1980), 425--432.Google ScholarCross Ref
Index Terms
- Trends in steganography
Recommendations
A JPEG-based statistically invisible steganography
ICIMCS '11: Proceedings of the Third International Conference on Internet Multimedia Computing and ServiceThe objective of steganography is to implement covert communication by hiding data in digital files such that there is no indication of the existence of hidden data; so an ideal steganographic system should be able to withstand all steganalysis methods--...
LSB-Based Steganography Using Reflected Gray Code
Steganography aims to hide secret data into an innocuous cover-medium for transmission and to make the attacker cannot recognize the presence of secret data easily. Even the stego-medium is captured by the eavesdropper, the slight distortion is hard to ...
Implementation of Least Significant Bit Steganography and statistical steganalysis
CCSEIT '12: Proceedings of the Second International Conference on Computational Science, Engineering and Information TechnologyLeast Significant Bit (LSB) Steganography is a method for hidden information in such a way that can only be detected by its intended recipient. Steganography in Digital media becomes a challenging discipline, since the Human Auditory System (HAS) is ...
Comments