Preview

Dependability

Advanced search

Steganalysis of the methods of concealing information in graphic containers

https://doi.org/10.21683/1729-2646-2021-21-3-39-46

Abstract

Aim. Today, there is a pressing matter of protection against steganography-based attacks against information systems. These attacks present a danger as they use the most common data files – especially graphics files – as containers that deliver malicious code to a system or cause a leak of sensitive information. Developing methods of detecting such hidden information is the responsibility of a special subsection of steganography, the steganalysis. Such methods should be extensively used in computer forensics as part of security incident investigation, as well as in automated security systems with integrated modules for analyzing data files for malicious or dangerous information. An important feature of such activities is the need to examine a wide variety of elements and containing files. In particular, it is required to verify not only the colour values of the pixels in images, but their frequency characteristics as well. This raises a number of important questions associated with the best practices of applying steganalysis algorithms and making correct conclusions based on the outputs. The paper aims to briefly analyse the most important and relevant methods of steganalysis, both spatial and frequency, as well as to make conclusions regarding their performance and ways to analyse the outputs based on the test results of the software that implements such methods.
Methods. The steganalysis of concealment within the least significant bits of an image’s pixels uses Pearson’s Chi-square statistical analysis, as well as the Regular-Singular method that involves signature analysis of pixel groups and analytical geometry tools for estimating the relative volume of the hidden message. The Koch-Zhao method of steganalysis is used for the purpose of detecting information embedded in the frequency-domain image representation. It also allows identifying the parameters required for extracting the hidden message.
Results. A software suite was created that includes the software implementations of the analysed methods. The suite was submitted to a number of tests in order to evaluate the outputs of the examined methods. For the purpose of testing, a sample of images of various formats was compiled, in which information was embedded using a number of methods. Based on the results of the sample file analysis, conclusions were made regarding the efficiency of the analysed methods and interpretation of the outputs.
Conclusion. Based on the test results, conclusions were made on the accuracy of the steganalysis methods in cases of varied size of the embedded message and methods of its concealment. The patterns identified with the help of the analysis outputs allowed defining a number of rules for translating the outputs into conclusions on the identification of the fact of detection of hidden information and estimation of its size.

About the Authors

Ya. L. Grachev
Russian University of Transport
Russian Federation

Yaroslav L. Grachev, Student 

Moscow



V. G. Sidorenko
Russian University of Transport; HSE University
Russian Federation

Valentina G. Sidorenko, Doctor of Engineering, Professor, Chair Professor, Department of Management and Protection of Information, Chair Professor, Department of Business Informatics

Moscow



References

1. Varnovsky N.P., Golubev E.A., Logachev O.A. [Modern trends in steganography]. Proceedings of the Conference Mathematics and security of information technologies in MSU, October 28-29, 2004. Moscow: MCCME; 2005.

2. Agranovsky A.V., Balakin A.V., Gribunin V.G. et al. [Steganography, digital watermarks and steganalysis: a monograph]. Moscow: Vuzovskaya kniga; 2009. (in Russ.)

3. Konakhovich G.F., Puzyrenko A.Y. [Computer steganography. Theory and practice]. Kiev: MK-Press; 2006. (in Russ.)

4. Westfeld A., Pfitzmann A. Attacks on Steganographic Systems. Dresden University of Technology, Department of Computer Science. Dresden (Germany): 1999. DOI: 10.1007/10719724_5.

5. Gonzalez R.C., Woods R.E. Digital image processing. Moscow: Tekhnosfera; 2005.

6. Fridrich J., Goljan M., Du R. Reliable Detection of LSB Steganography in Color and Grayscale Images. New York: Binghamton University; 2001. DOI: 10.1145/1232454.1232466.

7. Khayam S.A. The Discrete Cosine Transform (DCT): Theory and Application. Michigan: Department of Electrical and Computer Engineering, Michigan State University; 2003.

8. Farid H. Digital Image Forensics. Scientific American; 2008.

9. Belim S.V., Vilkhovsky D.E. Koch-Zhao algorithm steganalysis.Mathematical Structures and Modeling2018;4(48):113- 119. DOI: 10.25513/2222-8772.2018.4.139-119. (in Russ.)


Review

For citations:


Grachev Ya.L., Sidorenko V.G. Steganalysis of the methods of concealing information in graphic containers. Dependability. 2021;21(3):39-46. https://doi.org/10.21683/1729-2646-2021-21-3-39-46

Views: 1268


Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.


ISSN 1729-2646 (Print)
ISSN 2500-3909 (Online)