This page is meant to assist the press in finding information
about the ongoing search for steganographic content.
The following paragraphs answer frequently asked questions.
What is this all about?
-
Steganography is the art and science of hidden communication.
-
In February 20001, the USA Today reported
that terrorist have been using steganography to hide
communication in images on the Internet.
-
Motivated by the article, Niels Provos
developed a steganography detection framework, which he used
to analyze two million images from the Internet auction site
eBay. It consist of three tools:
-
crawl -
a web crawler that downloads images from the web.
-
Stegdetect/Stebreak - tools that identify images that might contain hidden messages, and then guess the secret key required to retrieve a hidden message if it exists.
-
disconcert - a distributed computing framework that
assists stegbreak by running it on a cluster of workstations.
-
Not a single hidden message was found.
-
Niels Provos is a doctoral candidate at the University of
Michigan, working with his advisor Peter Honeyman at the
Center for Information Technology Integration.
-
The details of the research are outlined in
"Detecting Steganographic Content on the Internet" by Niels Provos and Peter Honeyman, NDSS '02.
Why eBay?
-
In February 2001, the article Secret
Messages Come in .Wavs in Wired News mentioned eBay and
Amazon as places that carry steganographic content.
-
eBay has a very organized web structure that facilitates downloading
images pointed to by auctions.
What are the results?
-
Not a single hidden message was found in images that were
obtained from eBay auctions.
-
The recent ABC news coverage about steganography provided the
first real steganographic image; see ABC
Steganography Trophy.
What about images from USENET?
-
To increase the scope of the study, Niels Provos and Peter Honeyman analyzed
one million images from USENET archives for hidden messages.
-
The processing rate of the USENET archive was about
370,000 images per day. We analyzed about one million
images.
- The peak performance of the disconcert cluster is 870,000 keys per second. The cluster consists of about two-hundred workstations running
OpenBSD, Solaris, Linux and FreeBSD.
-
A dictionary attack against the suspicious images revealed no
hidden mesages. Our dictionary contains about 1.8 million
words and phrases.
-
Detailed results from the USENET search are available.
How does dictionary attack work on steganographic systems?
-
Steganographic systems embed header information in front of
the hidden message. The header contains
information about the length of the message, compression
methods, etc...
-
Dictionary attack with stegbreak chooses a key from a dictionary
and uses it to retrieve header information. If the header
makes sense, the guessed key is a candidate.
-
Our dictionary contains about 1,800,000 words and phrases.
-
The words are from English, German, French, Science Fiction
novels, the Koran, famous movies, songs, etc...
-
Dictionary attack on JPHide and JSteg-Shell is completely
independent of the hidden data. For OutGuess, file magic
is used to cut down on false positives.
For further questions, please contact Niels Provos
<provos@citi.umich.edu>.
Niels Provos
Last modified: Fri Jan 4 07:12:09 EST 2002