A Case Study for Automatic Detection of Steganographic Images in Network Traffic
Title | A Case Study for Automatic Detection of Steganographic Images in Network Traffic |
Publication Type | Conference Paper |
Year of Publication | 2017 |
Authors | Erdem, Ö, Turan, M. |
Conference Name | 2017 10th International Conference on Electrical and Electronics Engineering (ELECO) |
ISBN Number | 978-605-01-1134-7 |
Keywords | Algorithm design and analysis, automatic detection, composability, concealed data, corporate networks, cover file, cryptography, data breach detection, data breach prevention, data encapsulation, data mining, embedded messages, Image coding, Internet, Media, Metrics, network traffic, open source tool, privacy, pubcrawl, statistical signature based steganalysis algorithms, steganographic images, steganography, steganography detection, telecommunication traffic |
Abstract | Detection and prevention of data breaches in corporate networks is one of the most important security problems of today's world. The techniques and applications proposed for solution are not successful when attackers attempt to steal data using steganography. Steganography is the art of storing data in a file called cover, such as picture, sound and video. The concealed data cannot be directly recognized in the cover. Steganalysis is the process of revealing the presence of embedded messages in these files. There are many statistical and signature based steganalysis algorithms. In this work, the detection of steganographic images with steganalysis techniques is reviewed and a system has been developed which automatically detects steganographic images in network traffic by using open source tools. |
URL | https://ieeexplore.ieee.org/document/8266175/ |
Citation Key | erdem_case_2017 |
- Image coding
- telecommunication traffic
- steganography detection
- Steganography
- steganographic images
- statistical signature based steganalysis algorithms
- pubcrawl
- privacy
- open source tool
- network traffic
- Metrics
- Media
- internet
- Algorithm design and analysis
- embedded messages
- Data mining
- data encapsulation
- data breach prevention
- data breach detection
- Cryptography
- cover file
- corporate networks
- concealed data
- composability
- automatic detection