Back to Search
Start Over
Detecting novel steganography with an anomaly-based strategy
- Source :
- Journal of Electronic Imaging. 13:860
- Publication Year :
- 2004
- Publisher :
- SPIE-Intl Soc Optical Eng, 2004.
-
Abstract
- Popular press and congressional record report a belief by the intelligence community that Al Qaeda members communicate through messages embedded invisibly in images shared via the Internet. This is certainly plausible as steganography has a rich history of military and civilian use. Current signature-based approaches for detecting the presence of hidden messages rely on discerning "footprints" of steganographic tools. Of greater recent concern is detecting the use of novel tools for which no signature has been established. This research addresses this concern by using a method for detecting anomalies in seemingly innocuous images, applying a genetic algorithm within a computational immune system to leverage powerful image processing through wavelet analysis. The sensors developed with this system demonstrated a surprising level of capability to detect the use of steganographic tools for which the system had no previous exposure, including one tool designed to be statistically stealthy.
- Subjects :
- Steganalysis
Steganography tools
Steganography
Computer science
business.industry
Image processing
Computer security
computer.software_genre
Atomic and Molecular Physics, and Optics
Computer Science Applications
Wavelet
Genetic algorithm
Leverage (statistics)
The Internet
Electrical and Electronic Engineering
business
computer
Subjects
Details
- ISSN :
- 10179909
- Volume :
- 13
- Database :
- OpenAIRE
- Journal :
- Journal of Electronic Imaging
- Accession number :
- edsair.doi...........18ecbec0c2db921aaac4fa36f3b350fa
- Full Text :
- https://doi.org/10.1117/1.1789981