Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Forensic analysis of video steganography tools

View through CrossRef
Steganography is the art and science of concealing information in such a way that only the sender and intended recipient of a message should be aware of its presence. Digital steganography has been used in the past on a variety of media including executable files, audio, text, games and, notably, images. Additionally, there is increasing research interest towards the use of video as a media for steganography, due to its pervasive nature and diverse embedding capabilities. In this work, we examine the embedding algorithms and other security characteristics of several video steganography tools. We show how all feature basic and severe security weaknesses. This is potentially a very serious threat to the security, privacy and anonymity of their users. It is important to highlight that most steganography users have perfectly legal and ethical reasons to employ it. Some common scenarios would include citizens in oppressive regimes whose freedom of speech is compromised, people trying to avoid massive surveillance or censorship, political activists, whistle blowers, journalists, etc. As a result of our findings, we strongly recommend to cease any use of these tools, and to remove any contents that may have been hidden, and any carriers stored, exchanged and/or uploaded online. For many of these tools, carrier files will be trivial to detect, potentially compromising any hidden data and the parties involved in the communication. We finish this work by presenting our steganalytic results, that highlight a very poor current state of the art in practical video steganography tools. There is unfortunately a complete lack of secure and publicly available tools, and even commercial tools offer very poor security. We therefore encourage the steganography community to work towards the development of more secure and accessible video steganography tools, and make them available for the general public. The results presented in this work can also be seen as a useful resource for forensic examiners to determine the existence of any video steganography materials over the course of a computer forensic investigation.
Title: Forensic analysis of video steganography tools
Description:
Steganography is the art and science of concealing information in such a way that only the sender and intended recipient of a message should be aware of its presence.
Digital steganography has been used in the past on a variety of media including executable files, audio, text, games and, notably, images.
Additionally, there is increasing research interest towards the use of video as a media for steganography, due to its pervasive nature and diverse embedding capabilities.
In this work, we examine the embedding algorithms and other security characteristics of several video steganography tools.
We show how all feature basic and severe security weaknesses.
This is potentially a very serious threat to the security, privacy and anonymity of their users.
It is important to highlight that most steganography users have perfectly legal and ethical reasons to employ it.
Some common scenarios would include citizens in oppressive regimes whose freedom of speech is compromised, people trying to avoid massive surveillance or censorship, political activists, whistle blowers, journalists, etc.
As a result of our findings, we strongly recommend to cease any use of these tools, and to remove any contents that may have been hidden, and any carriers stored, exchanged and/or uploaded online.
For many of these tools, carrier files will be trivial to detect, potentially compromising any hidden data and the parties involved in the communication.
We finish this work by presenting our steganalytic results, that highlight a very poor current state of the art in practical video steganography tools.
There is unfortunately a complete lack of secure and publicly available tools, and even commercial tools offer very poor security.
We therefore encourage the steganography community to work towards the development of more secure and accessible video steganography tools, and make them available for the general public.
The results presented in this work can also be seen as a useful resource for forensic examiners to determine the existence of any video steganography materials over the course of a computer forensic investigation.

Related Results

A Generic Taxonomy for Steganography Methods
A Generic Taxonomy for Steganography Methods
A unified understanding of terms and their applicability is essential for every scientific discipline: steganography is no exception. Being divided into several domains (for instan...
A Generic Taxonomy for Steganography Methods
A Generic Taxonomy for Steganography Methods
<p>A unified understanding of terms and their applicability is essential for every scientific discipline: steganography is no exception. Being divided into several domains (f...
A Generic Taxonomy for Steganography Methods
A Generic Taxonomy for Steganography Methods
A unified understanding of terms and their applicability is essential for every scientific discipline: steganography is no exception. Being divided into several domains (for instan...
Forensic analysis of video steganography tools
Forensic analysis of video steganography tools
Steganography is the art and science of concealing information in such a way that only the sender and intended recipient of a message should be aware of its presence. Digital stega...
THEORY OF FORENSIC EXPERTOLOGY IN THE SYSTEM OF LAW
THEORY OF FORENSIC EXPERTOLOGY IN THE SYSTEM OF LAW
The article deals with the concept of a general theory of forensic expertology, the conditions for its creation, the place of forensic expert science in the system of legal science...
CORRELATION AND STRUCTURE OF A FORENSIC TECHNIQUE AND FORENSIC SCIENCE
CORRELATION AND STRUCTURE OF A FORENSIC TECHNIQUE AND FORENSIC SCIENCE
A historical analysis of forensic techniques and forensic science emergence as scientific branches is outlined, their interconnection, differences are considered, the subject, obje...
REGARDING RELATION BETWEEN CLASSIFICATION OF FORENSIC SCIENCE GENERAL THEORY TASKS AND PRACTICAL FORENSIC ACTIVITY (Review Article)
REGARDING RELATION BETWEEN CLASSIFICATION OF FORENSIC SCIENCE GENERAL THEORY TASKS AND PRACTICAL FORENSIC ACTIVITY (Review Article)
The article analyzes conceptual foundations, views and ideas as to understanding of the essence of the classification of forensic science general theory tasks. The main views of sc...
Enhancing Security through Advanced Image Steganography Techniques
Enhancing Security through Advanced Image Steganography Techniques
The project aims to explore various types of steganography techniques, with a focus on image steganography, where information is concealed within images. This involves decrypting t...

Back to Top