[iwar] [fc:Detecting.Steganographic.Content.on.the.Internet]

From: Fred Cohen (fc@all.net)
Date: 2001-09-17 07:17:20


Return-Path: <sentto-279987-1971-1000748076-fc=all.net@returns.onelist.com>
Delivered-To: fc@all.net
Received: from 204.181.12.215 by localhost with POP3 (fetchmail-5.1.0) for fc@localhost (single-drop); Mon, 17 Sep 2001 10:36:08 -0700 (PDT)
Received: (qmail 26071 invoked by uid 510); 17 Sep 2001 17:34:52 -0000
Received: from n9.groups.yahoo.com (216.115.96.59) by 204.181.12.215 with SMTP; 17 Sep 2001 17:34:52 -0000
X-eGroups-Return: sentto-279987-1971-1000748076-fc=all.net@returns.onelist.com
Received: from [10.1.4.55] by fl.egroups.com with NNFMP; 17 Sep 2001 17:34:36 -0000
X-Sender: fc@big.all.net
X-Apparently-To: iwar@onelist.com
Received: (EGP: mail-7_3_2_2); 17 Sep 2001 17:34:36 -0000
Received: (qmail 11945 invoked from network); 17 Sep 2001 14:17:20 -0000
Received: from unknown (10.1.10.26) by l9.egroups.com with QMQP; 17 Sep 2001 14:17:20 -0000
Received: from unknown (HELO big.all.net) (65.0.156.78) by mta1 with SMTP; 17 Sep 2001 14:17:20 -0000
Received: (from fc@localhost) by big.all.net (8.9.3/8.7.3) id HAA10643 for iwar@onelist.com; Mon, 17 Sep 2001 07:17:20 -0700
Message-Id: <200109171417.HAA10643@big.all.net>
To: iwar@onelist.com (Information Warfare Mailing List)
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL1]
From: Fred Cohen <fc@all.net>
Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com
Delivered-To: mailing list iwar@yahoogroups.com
Precedence: bulk
List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com>
Date: Mon, 17 Sep 2001 07:17:20 -0700 (PDT)
Reply-To: iwar@yahoogroups.com
Subject: [iwar] [fc:Detecting.Steganographic.Content.on.the.Internet]
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit

Detecting Steganographic Content on the Internet 
By Niels Provos and Peter Honeyman, SecurityFocus, 9/17/2001

Full text of the below is available at: http://www.citi.umich.edu/techreports/reports/citi-tr-01-11.pdf
<a href="http://www.citi.umich.edu/techreports/reports/citi-tr-01-11.ps.gz">http://www.citi.umich.edu/techreports/reports/citi-tr-01-11.ps.gz>

Steganography is used to hide the occurrence of communication.  Recent
suggestions in US newspapers indicate that terrorists use steganography
to communicate in secret with their accomplices.  In particular, images
on the internet were mentioned as the communication medium.  While the
newspaper articles sounded very dire, none substantiated these rumors. 
To determine whether there is steganographic content on the Internet,
this paper presents a detection framework that includes tools to
retrieve images from the world wide web and automatically detects
whether they might contain steganographic content.  To ascertain that
hidden messages exist in images, the detection framework includes a
distributed computing framework for launching dictionary attacks hosted
on a cluster of loosely coupled workstations.  We have analyzed two
million images downloaded from eBay actions but have not been able to
find a single hidden message. 

------------------------ Yahoo! Groups Sponsor ---------------------~-->
Get VeriSign's FREE GUIDE: "Securing Your Web Site for Business." Learn about using SSL for serious online security. Click Here!
http://us.click.yahoo.com/LgMkJD/I56CAA/yigFAA/kgFolB/TM
---------------------------------------------------------------------~->

------------------
http://all.net/ 

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 



This archive was generated by hypermail 2.1.2 : 2001-09-29 21:08:44 PDT