Cryptography Reference
In-Depth Information
in the very popular MP3 files. The mechanism tweaks the par-
ity of some of the quantized coefficients chosen using a random
number generator. [AP98]
http://www.outguess.org/ Niels Provos built the Outguess system to
hide information in JPEG files without distorting the statistical
profile. He also distributes the StegDetect program, which will
detect distortions in other steganographic systems.
http://www.psionic.com/papers/covert/ Psionic Software created
this package for hiding information in the redundant or op-
tional bits of the TCP/IP headers. (The IP packet identification
field, the TCP initial sequence number field and the TCP ac-
knowledged sequence number field.)
http://sandmark.cs.arizona.edu/ The SandMark tool, by Christian
Collberg, will embed information while obfuscating Java byte
code.
ftp://ftp.funet.fi/pub/crypt/steganography/PGM.stealth.c.gz PGM-
Stealth hides data in the least significant bits of PGM files on
UNIX boxes.
ftp://ftp.funet.fi/pub/crypt/steganography/piilo061195.tar.gz Piilo
hides data in the least significant bits of PGM files on UNIX
boxes.
http://www.cl.cam.ac.uk/fapp2/watermarking/stirmark/ The Stir-
Mark software helps test watermarking or image steganographic
methods by scrambling the images in subtle ways. The software
treats the image like a rubber sheet by stretching some parts,
blurring other parts, destroying some parts, and even duplicat-
ing small parts. The meddling is controlled with parameters so
watermark creators can make claims like, “This software resists
StirMark at settings up to 1.5.”
A.3
Steganalysis Software
http://www.spy-hunter.com/stegspydownload.htm StegSpy, by Bill
Englehardt, identifies some of the more common signatures
used in steganography programs.
http://www.outguess.org/ Niels Provos built the StegDetect system
to detect statistical differences in files with embedded mes-
sages. He also distributes the OutGuess program, which hides
information in JPEG files.
Search WWH ::




Custom Search