Browse > Article
http://dx.doi.org/10.3745/KIPSTC.2004.11C.1.039

Design and Analysis of the Web Stegodata Detection Systems using the Intrusion Detection Systems  

Do, Kyoung-Hwa (숭실대학교 대학원 컴퓨터학과)
Jun, Moon-Seog (숭실대학교 정보과학대학)
Abstract
It has been happening to transfer not only the general information but also the valuable information through the universal Internet. So security accidents as the expose of secret data and document increase. But we don't have stable structure for transmitting important data. Accordingly, in this paper we intend to use network based Intrusion Detection System modules and detect the extrusion of important data through the network, and propose and design the method for investigating concealment data to protect important data and investigate the secret document against the terrorism. We analyze the method for investigating concealment data, especially we use existing steganalysis techniques, so we propose and design the module emphasizing on the method for investigating stego-data in E-mail of attach files or Web-data of JPG, WAVE etc. Besides, we analyze the outcome through the experiment of the proposed stego-data detection system.
Keywords
Steganography; Stegodetection; Information Hiding; IDS; Information Security;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Edward Amoroso, Intrusion Detection, Intrusion.net Books, pp.26-28, 1999
2 Fabien A. P. & Petitcoals, Ross J. Anderson & Markus G. Kuhn, 'Information Hiding - A Survey,' Proceedings of the IEEE, 1999   DOI   ScienceOn
3 Neil F. Johnson & Sushil Jajodia, Steganalysis of Images Created Using Current Steganography Software, George Mason University, 1998
4 Neil F. Johnson & Sushil Jajodia, 'Exploring Steganography : Seeing the Unseen,' IEEE Computer, pp.26-34, 1998   DOI
5 Eugene T. Lin & Edward J. Delp, A Review of DataHiding in Digital Images, Purdue University, 1999
6 Qieng Cheng and Thomas S. Huang, 'An Additive Aproach to Transform-Domain Information Hiding and Optimum Detectio Structure,' IEEE Transactions on Mutimedia, Vol.3, No.3, September, 2001   DOI   ScienceOn
7 Online, Avalable : http://www.andrew.cmu.edu/~rdanyliw/ snort/snortacid.html
8 Jessica Fridrich & Miroslav Goljan, Practical Steganalysis of Digital Images, SUNY Binghamton, 2002
9 Andreas Westfeld & Andreas Pfitzmann, Attacks on Ste-ganographic Systems, Dresden University, 1999
10 Jian Zhao, A Digital Watermarking System for Multimedia Copyright Protection, Fraunhofer Center, 1996
11 Brian Laing, How To Guide-Implementing a Network Based Intrusion Detection System, Brian Laing sovereigh House, 2000