Steganalysis - a Way Forward Against Cyber Terrorism

被引:0
作者
Bogdanoski, Mitko [1 ]
Risteski, Aleksandar [2 ]
Pejoski, Slavche [2 ]
机构
[1] Mil Acad Gen Mihailo Apostolski, Skopje 1000, Macedonia
[2] Ss Cyril & Methodius Univ, Fac Elect Engn & Informat Technol, Skopje 1000, Macedonia
来源
2012 20TH TELECOMMUNICATIONS FORUM (TELFOR) | 2012年
关键词
Stegnanography; Steganalysis; Cyber Terrorism; Information Hiding;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
The cyber terrorism has become one of the biggest threats of our time. Strictly speaking, it is almost inconceivable functioning of a terrorist organization without using of the cyberspace as a very useful tool to implement its malicious activities. However, the terrorists' leaders are aware that their messages sanded to their perpetrators using Internet can be intercepted very easily and thus their intentions can be detected. Therefore, they are using different methods in order to protect their information, including steganography as an information hiding technique. The purpose of this paper is to give an overview of different steganography techniques, as well as to explain the existing advanced methods for detection of the hidden information. The paper also tends to explain the different steganalysis techniques that are striking a significant blow not only to the terrorist organizations, but also on any other individual or group that use steganographic techniques as a way for covert transmission of their malicious intents. Furthermore, in order to show the effectiveness of some steganalysis tools using Hex Editor Neo tool we are conducting a steganalysis on a stego object obtained by Ultima Steganography tool.
引用
收藏
页码:681 / 684
页数:4
相关论文
共 16 条
  • [1] al-Qaeda, 2007, AL QAED TRAIN MAN
  • [2] [Anonymous], 2003, Techniques and Applications of Digital Watermarking and Content Protection
  • [3] [Anonymous], STEGANOGRAPHY SOFTWA
  • [4] [Anonymous], VOIP STEGANOGRAPHY I
  • [5] Bauer FriedrichLudwig., 2002, Decrypted secrets: methods and maxims of cryptology
  • [6] Cole Eric, 2003, Hiding in Plain Sight: Steganography and the Art of Covert Communication
  • [7] Dinca L. M., 2011, INFORM EC, V15
  • [8] Hayati P., 2011, SURVEY STEGANOGRAPHI
  • [9] Huang Y., 2011, STEGANALYSIS COMPRES
  • [10] Kessler C., 2012, STEGANOGRAPHY ART HI