skip to main content
research-article
Free Access

Trends in steganography

Published:01 March 2014Publication History
Skip Abstract Section

Abstract

Methods for embedding secret data are more sophisticated than their ancient predecessors, but the basic principles remain unchanged.

References

  1. Adee, S. Spy vs. spy. IEEE Spectrum. (Aug. 2008); http://spectrum.ieee.org/computing/-software/spy-vs-spy/1.Google ScholarGoogle Scholar
  2. Alperovitch, D. Revealed: Operation Shady RAT. McAfee, 2011; http://www.mcafee.com/-us/resources/white-papers/wp-operation-shady-rat.pdf.Google ScholarGoogle Scholar
  3. Alureon trojan uses steganography to receive commands. (Sept. 2011); http://-www.virusbtn.com/news/2011/09_26.Google ScholarGoogle Scholar
  4. Analysis, S. and Center, R. World's largest digital steganography database expands again. SARC Press Release (Feb. 2012); http://www.sarc-wv.com/news/press_releases/-2012/safdb_v312.aspx.Google ScholarGoogle Scholar
  5. Anderson, R. Stretching the limits of steganography. Information Hiding. Springer, 1996, 39--48. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Anderson, R. Needham, R. and Shamir, A. The steganographic file system. Information Hiding. Springer, 1998, 73--82.Google ScholarGoogle Scholar
  7. Bencsáth, B., Pék, G., Buttyán, L. and Félegyházi, M. Duqu: A Stuxnet-like malware found in the wild, (2011); http://www.crysys.hu/publications/files/-bencsathPBF11duqu.pdf.Google ScholarGoogle Scholar
  8. Bender, W., Gruhl, D., Morimoto, N. and Lu, A. Techniques for data hiding. IBM Systems Journal 35, 3&4 (1996), 313--336. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Bennett, K. Linguistic steganography: Survey, analysis, and robustness concerns for hiding information in text (2004).Google ScholarGoogle Scholar
  10. Bergmair, R. A comprehensive bibliography of linguistic steganography. In Proceedings of the SPIE Intl Conf. on Security, Steganography, and Watermarking of Multimedia Contents, 2007.Google ScholarGoogle ScholarCross RefCross Ref
  11. Bryant, R., Ed. Investigating Digital Crime. John Wiley & Sons, 2008, 1--24.Google ScholarGoogle Scholar
  12. Castiglione, A. De Santis, A., Fiore, U. and Palmieri, F. An asynchronous covert channel using SPAM. Computers & Mathematics with Applications, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Cheddad, A., Condell, J., Curran, K. and Mc Kevitt, P. Digital image steganography: Survey and analysis of current methods. Signal Processing 90, 3 (2010), 727--752. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Chen, T. Stuxnet, the real start of cyber warfare? IEEE Network 24, 6 (2010), 2--3. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Cox, I. Digital Watermarking and Steganography. Morgan Kaufmann, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. De Sélincourt, A. Herodotus: The Histories. Penguin, 1954.Google ScholarGoogle Scholar
  17. El-Khalil, R. and Keromytis, A. Hydan: Hiding information in program binaries. Information and Communications Security, (2004), 287--291.Google ScholarGoogle ScholarCross RefCross Ref
  18. Falliere, N., Murchu, L. and Chien, E. W32.Stuxnet dossier. White paper. Symantec Corp., Security Response, 2011.Google ScholarGoogle Scholar
  19. Fra̧czek, W., Mazurczyk, W. and Szczypiorski, K. Hiding information in Stream Control Transmission Protocol. Computer Communications 35, 2 (2012), 159--169. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Fridrich, J. Steganography in Digital Media---Principles, Algorithms, and Applications. Cambridge University Press, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Goodin, D. Duqu spawned by 'well-funded team of competent coders.' World's first known modular rootkit does steganography, too. The Register, Nov. 2011.Google ScholarGoogle Scholar
  22. Grabska, I. and Szczypiorski, K. Steganography in LTE. In Proc. of Intl. Workshop on Cyber Crime, (San Jose, May 2014).Google ScholarGoogle Scholar
  23. Gross, M.J. Exclusive: Operation shady RAT---Unprecedented cyber-espionage campaign and intellectual-property bonanza. Vanity Fair (Aug. 2011).Google ScholarGoogle Scholar
  24. Hayati, P., Potdar, V. and Chang, E. A survey of steganographic and steganalytic tools for the digital forensic investigator. In Workshop of Information Hiding and Digital Watermarking, (Canada, 2007).Google ScholarGoogle Scholar
  25. Jankowski, B., Mazurczyk, W., and Szczypiorski, K. PadSteg: Introducing inter-protocol steganography. Telecommunication Systems: Modeling, Analysis, Design and Management 52, 2 (2013), 1101--1111.Google ScholarGoogle Scholar
  26. Johnson, N. and Jajodia, S. Steganalysis of images created using current steganography software. Information Hiding. Springer, 1998, 273--289.Google ScholarGoogle Scholar
  27. Kahn, D. The history of steganography. Information Hiding. Springer, 1996, 1--5. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Kellen, T. Hiding in plain view: Could steganography be a terrorist tool? SANS Institute InfoSec Reading Room, 2001; http://www.sans.org/reading_room/whitepapers/-stenganography/hiding-plain-view-steganography-terrorist-tool_551.Google ScholarGoogle Scholar
  29. Kelley, J. Terror groups hide behind Web encryption. USA Today (May 2001); http://-www.usatoday.com/tech/news/2001-02-05-binladen.htm.Google ScholarGoogle Scholar
  30. Kopiczko, P., Mazurczyk, W. and Szczypiorski, K. StegTorrent: A steganographic method for P2P files sharing service. In Proc. of Intl. Workshop on Cyber Crime, (San Francisco, CA, May 2013). Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. Lampson, B. A note on the confinement problem. Commun. ACM 16, 10 (Oct. 1973), 613--615. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. Lau, H. The truth behind the Shady RAT. McAffe report, (Aug. 2011); http://-www.symantec.com/connect/blogs/truth-behind-shady-rat.Google ScholarGoogle Scholar
  33. Lubacz, J., Mazurczyk, W. and Szczypiorski, K. Vice over IP. IEEE Spectrum 47, 2 (2010), 42--47. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. Markey, H. and Antheil, G. Secret communication system. Aug. 11 1942, US Patent 2,292,387.Google ScholarGoogle Scholar
  35. Mazurczyk, W., Karaś, M. and Szczypiorski, K. SkyDe: A Skype-based steganographic method. International J. Computers, Communications & Control 8, 3 (June 2013), 389--400.Google ScholarGoogle Scholar
  36. Mazurczyk, W., Szaga, P. and Szczypiorski, K. Using transcoding for hidden communication in IP telephony. Multimedia Tools and Applications (2011), 1--27; DOI 10.1007/s11042-012-1224-8.Google ScholarGoogle Scholar
  37. Nagaraja, S., Houmansadr, A., Piyawongwisal, P., Singh, V. Agarwal, and Borisov, N. Stegobot: A covert social network botnet. Information Hiding. Springer, 2011, 299--313. Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. Networking and Information Technology Research and Development Program. I.W.G. on Cyber Security and I. Assurance. Federal Plan for Cyber Security and Information Assurance Research and Development, (Apr. 2006); http://www.nitrd.gov/pubs/csia/-csia_federal_plan.pdf.Google ScholarGoogle Scholar
  39. Pang, H., Tan, K. and Zhou, X. Stegfs: A steganographic file system. In Proceedings of the 19th Intl. Conf. on Data Engineering. IEEE, 2003, 657--667.Google ScholarGoogle ScholarCross RefCross Ref
  40. Petitcolas, F., Anderson, R. and Kuhn, M. Information hiding---A survey. In Proceedings of the IEEE 87, 7 (1999), 1062--1078.Google ScholarGoogle ScholarCross RefCross Ref
  41. Ristenpart, T., Tromer, E., Shacham, H. and Savage, S. 'Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds.' In Proceedings of the 16th ACM Conference on Computer and Communications Security. ACM, 2009, 199--212. Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. Rowland, C. Covert channels in the TCP/IP protocol suite. First Monday 2, 5 (1997).Google ScholarGoogle ScholarCross RefCross Ref
  43. Rudin, B. and Tanner, R. Making Paper: A Look into the History of an Ancient Craft. Rudin, 1990.Google ScholarGoogle Scholar
  44. Shachtman, N. FBI: Spies hid secret messages on public websites. Wired (June 2010); http://www.wired.com/dangerroom/2010/06/alleged-spies-hid-secret-messages-on-public-websites/.Google ScholarGoogle Scholar
  45. Sieberg, D. Bin Laden exploits technology to suit his needs. CNN (Sept. 2001); http://-edition.cnn.com/2001/US/09/20/inv.terrorist.search/.Google ScholarGoogle Scholar
  46. Simmons, G. The prisoners' problem and the subliminal channel. In Proceedings of Crypto '83: Advances in Cryptology (1984), 51--67.Google ScholarGoogle ScholarCross RefCross Ref
  47. Singh, S. The Code Book: The Secret History of Codes and Codebreaking. Fourth Estate, 2000.Google ScholarGoogle Scholar
  48. Smith, D. Number games and number rhymes: The great number game of dice. The Teachers College Record 13, 5 (1912), 39--53.Google ScholarGoogle Scholar
  49. Srivastava, K. Congress wants answers on world's largest security breach. Aug. 2011; http://www.mobiledia.com/news/102480.html.Google ScholarGoogle Scholar
  50. Stier, C. Russian spy ring hid secret messages on the Web. (July 2010); http://-www.newscientist.com/article/dn19126-russian-spy-ring-hid-secret-messages-on-the-web.html.Google ScholarGoogle Scholar
  51. Symantec. W32.Duqu---The precursor to the next Stuxnet, (Nov. 2011); http://-www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/-w32_duqu_the_precursor_to_the_next_stuxnet_research.pdf.Google ScholarGoogle Scholar
  52. Szczypiorski, K. Steganography in TCP/IP networks. In Proceedings of State of the Art and a Proposal of a New System-HICCUPS. Institute of Telecommunications' seminar, Warsaw University of Technology, Poland, 2003.Google ScholarGoogle Scholar
  53. Szczypiorski, K. and Mazurczyk, W. Steganography in IEEE 802.11 OFDM symbols. Security and Communication Networks 3 (2011), 1--12.Google ScholarGoogle Scholar
  54. Wang, Y. and Izquierdo, E. High-capacity data hiding in MPEG-2 compressed video. In Proceeding of the 9th Intl. Workshop on Systems, Signals and Image Processing (Manchester, U.K., 2002), 212--218.Google ScholarGoogle ScholarCross RefCross Ref
  55. Wayner, P. Disappearing Cryptography---Information Hiding: Steganography & Watermarking. Morgan Kaufmann, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  56. White, W. The Microdot: History and Application. Phillips Publications, 1992.Google ScholarGoogle Scholar
  57. Williams, C. Russian spy ring bust uncovers tech toolkit The Register (June 2010); http://www.theregister.co.uk/2010/06/29/spy_ring_tech/.Google ScholarGoogle Scholar
  58. Xu, C., Ping, X. and Zhang, T. Steganography in compressed video stream. In Proceedings of the First International Conference on Innovative Computing, Information and Control. IEEE, 2006, 269--272. Google ScholarGoogle ScholarDigital LibraryDigital Library
  59. Zimmermann, H. OSI reference model---the ISO model of architecture for open systems interconnection. IEEE Transactions on Communications 28, 4 (1980), 425--432.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Trends in steganography

              Recommendations

              Comments

              Login options

              Check if you have access through your login credentials or your institution to get full access on this article.

              Sign in

              Full Access

              • Published in

                cover image Communications of the ACM
                Communications of the ACM  Volume 57, Issue 3
                March 2014
                99 pages
                ISSN:0001-0782
                EISSN:1557-7317
                DOI:10.1145/2566590
                • Editor:
                • Moshe Y. Vardi
                Issue’s Table of Contents

                Copyright © 2014 ACM

                Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

                Publisher

                Association for Computing Machinery

                New York, NY, United States

                Publication History

                • Published: 1 March 2014

                Permissions

                Request permissions about this article.

                Request Permissions

                Check for updates

                Qualifiers

                • research-article
                • Popular
                • Refereed

              PDF Format

              View or Download as a PDF file.

              PDFChinese translation

              eReader

              View online with eReader.

              eReader

              HTML Format

              View this article in HTML Format .

              View HTML Format