Image Steganography:
Network Steganography:
Image Steganalysis - Feature Extractors*:
Network Steganalysis
- F5 is a steganography algo for hiding information in JPEG images. Westfeld A. F5ea steganographic algorithm (high capacity despite better steganalysis). In: Moskowitz I, editor. Information hiding. vol. 2137 of lecture notes in Computer Science. Berlin/Heidelberg: Springer; 2001. p. 289e302.
- JPHIDE and JPSEEK are programs which allow you to hide a file in a jpeg visual image.
- Jsteg is an open steganography software on Internet. It uses the LSB of DCT coefficients to hide secret information.
- Mr Hide is a steganography tool for hiding information inside images.
- OpenPuff is a professional steganography tool, with unique features you won't find among any other free or commercial software. OpenPuff is 100% free and suitable for highly sensitive data covert transmission.
- OpenStego is an open-source software distributed under the terms of the GNU General Public License v2.0.
- Perturbed Quantization: the sender hides data while processing the cover object with an information-reducing operation that involves quantization, such as lossy compression, downsampling, or A/D conversion.
- Steghide is a steganography program that is able to hide data in various kinds of image- and audio-files. The color-respectively sample-frequencies are not changed thus making the embedding resistant against first-order statistical tests.
- Steghide Online: Web page for Steganography using Steghide.
- StegoBlue: LSB Steganography on Bitmaps in Python.
- MP3Stego will hide information in MP3 files during the compression process. The data is first compressed, encrypted and then hidden in the MP3 bit stream.
Network Steganography:
- SteganRTP is a steganography tool which establishes a full-duplex steganographic data transfer protocol utilizing Real-time Transfer Protocol (RTP) packet payloads as the cover medium. The tool provides interactive chat, file transfer, and remote shell access.
- HCovert is a steganographic communications tool used to create a covert channel using a HTTP GET request to convey it's message to a webserver and webserver log parsing to retrievethe message. This tool will both send as well as recieve messages.
- Netcross is a tunneling software particularly useful in restricted (read firewalled) network environments, which is able to establish IP tunnels exploiting Domain Name Resolution requests/responses.
- Cctt, "Covert Channel Tunneling Tool" - is a tool presenting several exploitation techniques allowing the creation of arbitrary data transfer channels in the data streams authorized by a network access control system.
- Cooking channels - is a set of two python scripts (CGI and client) allowing to build a communication channel over HTTP cookies.
Image Steganalysis - Feature Extractors*:
- Merged Features - T. Pevny and J. Fridrich, Merging Markov and DCT features for multi-class JPEG steganalysis. In E.J. Delp and P.W. Wong, editors, Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents IX, volume 6505, pages 3 1 - 3 14, San Jose, CA, January 29 / February 1, 2007.
- PPD - Daniel Lerch-Hostalot, David Megías. LSB matching steganalysis based on patterns of pixel differences and random embedding Computers & Security, Volume 32, February 2013, Pages 192-206.
- Rich Models - J. Fridrich and J. Kodovsky, Rich models for steganalysis of digital images, IEEE Transactions on Information Forensics and Security.
- SPAM - T. Pevny and P. Bas and J. Fridrich Steganalysis by subtractive pixel adjacency matrix. Steganalysis by subtractive pixel adjacency matrix, Princeton, NJ, September 7-8, 2009.
Network Steganalysis
- Cctde is a first implementation of the Gray-World.net Covert Channel and Tunneling over the HTTP protocol Detection : GW implementation theoretical design paper.
- Ensemble Classifiers - J. Kodovský, J. Fridrich, and V. Holub, Ensemble Classifiers for Steganalysis of Digital Media. IEEE Transactions on Information Forensics and Security, Vol. 7, No. 2, pp. 432-444, April 2012.
- LibSVM - Chang, Chih-Chung and Lin, Chih-Jen. A library for support vector machines. ACM Transactions on Intelligent Systems and Technology. 2:27:1--27:27, 2011.
0 comments :
Post a Comment