Steganography Press Information
This page is meant to assist the press in finding information
about the ongoing search for steganographic content.
The following paragraphs answer frequently asked questions.
What is this all about?
-
Steganography is the art and science of hidden communication.
-
In February 20001, the USA Today reported
that terrorist have been using steganography to hide
communication in images on the Internet.
-
Motivated by the article, Niels Provos
developed a steganography detection framework, which he used
to analyze two million images from the Internet auction site
eBay. It consist of three tools:
-
crawl -
a web crawler that downloads images from the web.
-
Stegdetect/Stebreak - tools that identify images that might contain hidden messages, and then guess the secret key required to retrieve a hidden message if it exists.
-
disconcert - a distributed computing framework that
assists stegbreak by running it on a cluster of workstations.
-
Not a single hidden message was found.
-
Niels Provos is a doctoral candidate at the University of
Michigan, working with his advisor Peter Honeyman at the
Center for Information Technology Integration.
-
The details of the research are outlined in
"Detecting Steganographic Content on the Internet" by Niels Provos and Peter Honeyman, NDSS '02.
Why eBay?
-
In February 2001, the article Secret
Messages Come in .Wavs in Wired News mentioned eBay and
Amazon as places that carry steganographic content.
-
eBay has a very organized web structure that facilitates downloading
images pointed to by auctions.
What are the results?
-
Not a single hidden message was found in images that were
obtained from eBay auctions.
-
The recent ABC news coverage about steganography provided the
first real steganographic image; see ABC
Steganography Trophy.
What about images from USENET?
-
To increase the scope of the study, Niels Provos and Peter Honeyman analyzed
one million images from USENET archives for hidden messages.
-
The processing rate of the USENET archive was about
370,000 images per day. We analyzed about one million
images.
- The peak performance of the disconcert cluster is 870,000 keys per second. The cluster consists of about two-hundred workstations running
OpenBSD, Solaris, Linux and FreeBSD.
-
A dictionary attack against the suspicious images revealed no
hidden mesages. Our dictionary contains about 1.8 million
words and phrases.
-
Detailed results from the USENET search are available.
How does dictionary attack work on steganographic systems?
-
Steganographic systems embed header information in front of
the hidden message. The header contains
information about the length of the message, compression
methods, etc...
-
Dictionary attack with stegbreak chooses a key from a dictionary
and uses it to retrieve header information. If the header
makes sense, the guessed key is a candidate.
-
Our dictionary contains about 1,800,000 words and phrases.
-
The words are from English, German, French, Science Fiction
novels, the Koran, famous movies, songs, etc...
-
Dictionary attack on JPHide and JSteg-Shell is completely
independent of the hidden data. For OutGuess, file magic
is used to cut down on false positives.
For further questions, please contact Niels Provos <provos@citi.umich.edu>.
Niels Provos
Last modified: Fri Jan 4 07:12:09 EST 2002