Publications

Results 51–59 of 59
Skip to search filters

Extracting hidden messages in steganographic images

Digital Investigation

Quach, Tu-Thach Q.

The eventual goal of steganalytic forensic is to extract the hidden messages embedded in steganographic images. A promising technique that addresses this problem partially is steganographic payload location, an approach to reveal the message bits, but not their logical order. It works by finding modified pixels, or residuals, as an artifact of the embedding process. This technique is successful against simple least-significant bit steganography and group-parity steganography. The actual messages, however, remain hidden as no logical order can be inferred from the located payload. This paper establishes an important result addressing this shortcoming: we show that the expected mean residuals contain enough information to logically order the located payload provided that the size of the payload in each stego image is not fixed. The located payload can be ordered as prescribed by the mean residuals to obtain the hidden messages without knowledge of the embedding key, exposing the vulnerability of these embedding algorithms. We provide experimental results to support our analysis.

More Details

Cover estimation and payload location using Markov random fields

Proceedings of SPIE - The International Society for Optical Engineering

Quach, Tu-Thach Q.

Payload location is an approach to find the message bits hidden in steganographic images, but not necessarily their logical order. Its success relies primarily on the accuracy of the underlying cover estimators and can be improved if more estimators are used. This paper presents an approach based on Markov random field to estimate the cover image given a stego image. It uses pairwise constraints to capture the natural two-dimensional statistics of cover images and forms a basis for more sophisticated models. Experimental results show that it is competitive against current state-of-The-Art estimators and can locate payload embedded by simple LSB steganography and group-parity steganography. Furthermore, when combined with existing estimators, payload location accuracy improves significantly. © 2014 SPIE-IS&T .

More Details

A general model of resource production and exchange in systems of interdependent specialists

Beyeler, Walter E.; Glass, Robert J.; Finley, Patrick D.; Quach, Tu-Thach Q.

Infrastructures are networks of dynamically interacting systems designed for the flow of information, energy, and materials. Under certain circumstances, disturbances from a targeted attack or natural disasters can cause cascading failures within and between infrastructures that result in significant service losses and long recovery times. Reliable interdependency models that can capture such multi-network cascading do not exist. The research reported here has extended Sandia's infrastructure modeling capabilities by: (1) addressing interdependencies among networks, (2) incorporating adaptive behavioral models into the network models, and (3) providing mechanisms for evaluating vulnerability to targeted attack and unforeseen disruptions. We have applied these capabilities to evaluate the robustness of various systems, and to identify factors that control the scale and duration of disruption. This capability lays the foundation for developing advanced system security solutions that encompass both external shocks and internal dynamics.

More Details
Results 51–59 of 59
Results 51–59 of 59