Forensic analysis of video steganography tools

Steganography is the art and science of concealing information in such a way that only the sender and intended recipient of a message should be aware of its presence. Digital steganography has been used in the past on a variety of media including executable files, audio, text, games and, notably, im...

Full description

Bibliographic Details
Main Authors: Thomas Sloan, Julio Hernandez-Castro
Format: Article
Language:English
Published: PeerJ Inc. 2015-05-01
Series:PeerJ Computer Science
Subjects:
Online Access:https://peerj.com/articles/cs-7.pdf
id doaj-818c326503354ad397584153b68d84bf
record_format Article
spelling doaj-818c326503354ad397584153b68d84bf2020-11-24T20:56:01ZengPeerJ Inc.PeerJ Computer Science2376-59922015-05-011e710.7717/peerj-cs.7Forensic analysis of video steganography toolsThomas Sloan0Julio Hernandez-Castro1School of Computing, University of Kent, Canterbury, Kent, United KingdomSchool of Computing, University of Kent, Canterbury, Kent, United KingdomSteganography is the art and science of concealing information in such a way that only the sender and intended recipient of a message should be aware of its presence. Digital steganography has been used in the past on a variety of media including executable files, audio, text, games and, notably, images. Additionally, there is increasing research interest towards the use of video as a media for steganography, due to its pervasive nature and diverse embedding capabilities. In this work, we examine the embedding algorithms and other security characteristics of several video steganography tools. We show how all feature basic and severe security weaknesses. This is potentially a very serious threat to the security, privacy and anonymity of their users. It is important to highlight that most steganography users have perfectly legal and ethical reasons to employ it. Some common scenarios would include citizens in oppressive regimes whose freedom of speech is compromised, people trying to avoid massive surveillance or censorship, political activists, whistle blowers, journalists, etc. As a result of our findings, we strongly recommend ceasing any use of these tools, and to remove any contents that may have been hidden, and any carriers stored, exchanged and/or uploaded online. For many of these tools, carrier files will be trivial to detect, potentially compromising any hidden data and the parties involved in the communication. We finish this work by presenting our steganalytic results, that highlight a very poor current state of the art in practical video steganography tools. There is unfortunately a complete lack of secure and publicly available tools, and even commercial tools offer very poor security. We therefore encourage the steganography community to work towards the development of more secure and accessible video steganography tools, and make them available for the general public. The results presented in this work can also be seen as a useful resource for forensic examiners to determine the existence of any video steganography materials over the course of a computer forensic investigation.https://peerj.com/articles/cs-7.pdfSteganographySteganalysisVideoSignatureEOF injection
collection DOAJ
language English
format Article
sources DOAJ
author Thomas Sloan
Julio Hernandez-Castro
spellingShingle Thomas Sloan
Julio Hernandez-Castro
Forensic analysis of video steganography tools
PeerJ Computer Science
Steganography
Steganalysis
Video
Signature
EOF injection
author_facet Thomas Sloan
Julio Hernandez-Castro
author_sort Thomas Sloan
title Forensic analysis of video steganography tools
title_short Forensic analysis of video steganography tools
title_full Forensic analysis of video steganography tools
title_fullStr Forensic analysis of video steganography tools
title_full_unstemmed Forensic analysis of video steganography tools
title_sort forensic analysis of video steganography tools
publisher PeerJ Inc.
series PeerJ Computer Science
issn 2376-5992
publishDate 2015-05-01
description Steganography is the art and science of concealing information in such a way that only the sender and intended recipient of a message should be aware of its presence. Digital steganography has been used in the past on a variety of media including executable files, audio, text, games and, notably, images. Additionally, there is increasing research interest towards the use of video as a media for steganography, due to its pervasive nature and diverse embedding capabilities. In this work, we examine the embedding algorithms and other security characteristics of several video steganography tools. We show how all feature basic and severe security weaknesses. This is potentially a very serious threat to the security, privacy and anonymity of their users. It is important to highlight that most steganography users have perfectly legal and ethical reasons to employ it. Some common scenarios would include citizens in oppressive regimes whose freedom of speech is compromised, people trying to avoid massive surveillance or censorship, political activists, whistle blowers, journalists, etc. As a result of our findings, we strongly recommend ceasing any use of these tools, and to remove any contents that may have been hidden, and any carriers stored, exchanged and/or uploaded online. For many of these tools, carrier files will be trivial to detect, potentially compromising any hidden data and the parties involved in the communication. We finish this work by presenting our steganalytic results, that highlight a very poor current state of the art in practical video steganography tools. There is unfortunately a complete lack of secure and publicly available tools, and even commercial tools offer very poor security. We therefore encourage the steganography community to work towards the development of more secure and accessible video steganography tools, and make them available for the general public. The results presented in this work can also be seen as a useful resource for forensic examiners to determine the existence of any video steganography materials over the course of a computer forensic investigation.
topic Steganography
Steganalysis
Video
Signature
EOF injection
url https://peerj.com/articles/cs-7.pdf
work_keys_str_mv AT thomassloan forensicanalysisofvideosteganographytools
AT juliohernandezcastro forensicanalysisofvideosteganographytools
_version_ 1716791098665336832