Approach analysis to prevent steganography data flows as a corporate security breaches

  • 1 Lviv Polytechnic National University, Lviv, Ukraine

Abstract

Once the steganography was invented, it still remains one of the most effective ways to hide information in publicly accessed data sources. Many applications of different steganography techniques were known since WWII, but there are no yet any good approach to detect whether there is a hidden message in some data source (image etc.) while it is not expected to be found. This may also cause a fundamental security breach in corporate security systems. In the era of Facebook, Instagram and many other social networks with a huge amount of images and photos it seems obvious to use steganography applications for the purpose of security breach. A saboteur or a spy can use any image from social networks to disclose corporate sensitive data or to exchange hidden messages. That is why steganography detection should be considered as a necessary tool to prevent security breaches and sensitive data leaks. This research is focused on analysis of current approaches in problem of steganography detection. Mainly the approaches to detect steganography in images were discussed.

Keywords

References

  1. Steganography – Wikipedia // Wikipedia.org – 01.10.2018. – https://en.wikipedia.org/wiki/Steganography
  2. Steganography: Past, Present, Future / James C. Judge // SANS Institute, 2001. – 29 p. – Retrieved from: https://www.sans.org/readingroom/whitepapers/stenganography/paper/552
  3. Review on steganography for hiding data / Sagar S.Pawar, Vinit Kakde // International Journal of Computer Science and Mobile Computing – Vol. 3 Issue 4, Apr. 2014, P. 225-229. – Retrieved from: https://www.ijcsmc.com/docs/papers/April2014/V3I4201468.pdf
  4. Steganography and Steganalysis: Different Approaches / Soumyendu Das, Subhendu Das, Bijoy Bandyopadhyay, Sugata Sanyal // ArXiv.org, 2011 – Retrieved from: https://arxiv.org/ftp/arxiv/papers/1111/1111.3758.pdf
  5. Steganography An Art of Hiding Data / Shashikala Channalli, Ajay Jadhav // International Journal on Computer Science and Engineering – Vol. 1(3), 2009. – P.137-141 – Retrieved from: https://arxiv.org/ftp/arxiv/papers/0912/0912.2319.pdf
  6. Unseen: An Overview of Steganography and Presentation of Associated Java Application C-Hide / Jessica Codr // Washington University in St. Louis, Apr. 2009. – 21 p. – Retrieved from: https://www.cse.wustl.edu/~jain/cse571-09/ftp/stegano.pdf
  7. Detecting Steganographic Content on the Internet / Niels Provos, Peter Honeyman // CITI Technical Report 01-11, Center for Information Technology Integration, University of Michigan, Aug. 2001. – 14 p. – Retrieved from: http://www.citi.umich.edu/techreports/reports/citi-tr-01-11.pdf
  8. Criminal complaint by Special Agent Ricci against alleged Russian agents (PDF). United States Department of Justice, 28.06.2010 – http://www.justice.gov/opa/documents/062810complaint2.pdf
  9. Jack Kelley. Terror groups hide behind Web encryption. USA Today, Feburary 2001. – http://www.usatoday.com/life/cyber/tech/2001-02-05-binladen.htm

Article full text

Download PDF