Font Size: a A A

Analysis & Attack Of The Popular Network Steganography Software

Posted on:2010-03-24Degree:MasterType:Thesis
Country:ChinaCandidate:G RenFull Text:PDF
GTID:2178330332478449Subject:Applied Mathematics
Abstract/Summary:PDF Full Text Request
Information hiding as a cutting-edge technology in the field of information security has become a research hotspot. Steganography and steganalysis are important branches of information hiding. The former utilized optical and statistical redundance to research on how to send secret message covertly by embedding it into some public digital multimedia. The latter studyed on how to detect, extract, and recover/destroy the hidden information. In recent years steganography software has been very popular in the Internet, and people of no expertise can use them easily, as that software may be as a tool of crime by terrorists. So how to attack to the steganography software is a important problem to safety and military department.This paper was mainly about analysis and attack of some popular software in the Internet, and we got the following results:1. passive attack based on characteristic code①we analyzed feature and style of software's characteristic code, and proposed a method to find code. By it we found 21 BMP's,5 GIF's, 12 JPEG's static code and 4 dynamic code, based on these we proposed a method to detect the software. This method has small false-fate and a good result in a little embedding-rate, besides it can identify the software.②we proposed a method to estimate the mechanism of software, and found 18 software's mechanism, based on that we could estimate the key of steganography, establishing to extract message.2. analysis and attack on Jphide①we analyzed Jphide from data structure, mechanism, embedding way, the study showed that it was a steganagraphy method based on control table to embed messages, using a table to fix on the position and mode of embedding.②Then we found two statistical characteristics and proposed a method to detect it, experiments showed that we could estimate accurately when embedding rate was between 10-50%.3. active attack of spatial steganographywe did active attack on spatial steganography method by three filtering algorithm, used BER and PSNR to analysis performance of three method. Experiments showed that vena filtering was the best method.
Keywords/Search Tags:Steganography Software, Steganalysis, Characteristic Code, Passive Attack, Jphide, Active Attack
PDF Full Text Request
Related items