Document Imaging and Stenography

Detecting novel steganography with an anomaly-based strategy

[+] Author Affiliations
Jacob T. Jackson

Air Force Research Laboratory, Munitions Directorate, Eglin Air Force Base, Florida?32542 E-mail: jacob.jackson@eglin.af.mil

Gregg H. Gunsch, Roger L. Claypoole, Gary B. Lamont

Air Force Institute of Technology, Department of Electrical and Computer Engineering, Wright-Patterson Air Force Base, Ohio?45433

J. Electron. Imaging. 13(4), 860-870 (Oct 01, 2004). doi:10.1117/1.1789981
History: Received Jun. 18, 2003; Revised Jan. 8, 2004; Accepted Jan. 29, 2004; Online September 30, 2004
Text Size: A A A

Popular press and congressional record report a belief by the intelligence community that Al Qaeda members communicate through messages embedded invisibly in images shared via the Internet. This is certainly plausible as steganography has a rich history of military and civilian use. Current signature-based approaches for detecting the presence of hidden messages rely on discerning “footprints” of steganographic tools. Of greater recent concern is detecting the use of novel tools for which no signature has been established. This research addresses this concern by using a method for detecting anomalies in seemingly innocuous images, applying a genetic algorithm within a computational immune system to leverage powerful image processing through wavelet analysis. The sensors developed with this system demonstrated a surprising level of capability to detect the use of steganographic tools for which the system had no previous exposure, including one tool designed to be statistically stealthy. © 2004 SPIE and IS&T.

© 2004 SPIE and IS&T

Citation

Jacob T. Jackson ; Gregg H. Gunsch ; Roger L. Claypoole, Jr. and Gary B. Lamont
"Detecting novel steganography with an anomaly-based strategy", J. Electron. Imaging. 13(4), 860-870 (Oct 01, 2004). ; http://dx.doi.org/10.1117/1.1789981


Access This Article
Sign in or Create a personal account to Buy this article ($20 for members, $25 for non-members).

Some tools below are only available to our subscribers or users with an online account.

Related Content

Customize your page view by dragging & repositioning the boxes below.

Related Book Chapters

Topic Collections

Advertisement
  • Don't have an account?
  • Subscribe to the SPIE Digital Library
  • Create a FREE account to sign up for Digital Library content alerts and gain access to institutional subscriptions remotely.
Access This Article
Sign in or Create a personal account to Buy this article ($20 for members, $25 for non-members).
Access This Proceeding
Sign in or Create a personal account to Buy this article ($15 for members, $18 for non-members).
Access This Chapter

Access to SPIE eBooks is limited to subscribing institutions and is not available as part of a personal subscription. Print or electronic versions of individual SPIE books may be purchased via SPIE.org.