scholarly journals Forensic analysis of video steganography tools

Author(s):  
Thomas Sloan ◽  
Julio Hernandez-Castro

Steganography is the art and science of concealing information in such a way that only the sender and intended recipient of a message should be aware of its presence. Digital steganography has been used in the past on a variety of media including executable files, audio, text, games and, notably, images. There is increasing research interest towards the use of video as a media for steganography. This is, at least in part, due to its pervasive nature and good embedding capabilities. In this article, we examine the embedding algorithms and security characteristics of several video steganography tools. We conclude that many feature basic and severe weaknesses. This constitutes a serious threat to those using these applications, some of which have perfectly legal or ethical reasons to do so, such as those whose freedom of speech is superseded by oppressive regimes, whistle-blowers, journalists, etc. As a result of our findings, we strongly recommend to cease any use of these tools, and to remove any contents that may have been hidden, exchanged and/or uploaded online. For many of these tools, carrier files will be trivial to detect, potentially compromising any hidden data. We finish this work by presenting our steganalytic results, that highlight a very poor state of the art in practical video steganography tools. As there is a complete lack of secure and publicly available tools, both free and commercial, we therefore encourage the steganography community to work towards the development of more secure and accessible video steganography tools for the general public. The results presented in this work can also be seen as a useful resource for forensic examiners to determine the existence of any video steganography materials over the course of a computer forensic investigation.

2015 ◽  
Author(s):  
Thomas Sloan ◽  
Julio Hernandez-Castro

Steganography is the art and science of concealing information in such a way that only the sender and intended recipient of a message should be aware of its presence. Digital steganography has been used in the past on a variety of media including executable files, audio, text, games and, notably, images. Additionally, there is increasing research interest towards the use of video as a media for steganography, due to its pervasive nature and diverse embedding capabilities. In this work, we examine the embedding algorithms and other security characteristics of several video steganography tools. We show how all feature basic and severe security weaknesses. This is potentially a very serious threat to the security, privacy and anonymity of their users. It is important to highlight that most steganography users have perfectly legal and ethical reasons to employ it. Some common scenarios would include citizens in oppressive regimes whose freedom of speech is compromised, people trying to avoid massive surveillance or censorship, political activists, whistle blowers, journalists, etc. As a result of our findings, we strongly recommend to cease any use of these tools, and to remove any contents that may have been hidden, and any carriers stored, exchanged and/or uploaded online. For many of these tools, carrier files will be trivial to detect, potentially compromising any hidden data and the parties involved in the communication. We finish this work by presenting our steganalytic results, that highlight a very poor current state of the art in practical video steganography tools. There is unfortunately a complete lack of secure and publicly available tools, and even commercial tools offer very poor security. We therefore encourage the steganography community to work towards the development of more secure and accessible video steganography tools, and make them available for the general public. The results presented in this work can also be seen as a useful resource for forensic examiners to determine the existence of any video steganography materials over the course of a computer forensic investigation.


2015 ◽  
Author(s):  
Thomas Sloan ◽  
Julio Hernandez-Castro

Steganography is the art and science of concealing information in such a way that only the sender and intended recipient of a message should be aware of its presence. Digital steganography has been used in the past on a variety of media including executable files, audio, text, games and, notably, images. Additionally, there is increasing research interest towards the use of video as a media for steganography, due to its pervasive nature and diverse embedding capabilities. In this work, we examine the embedding algorithms and other security characteristics of several video steganography tools. We show how all feature basic and severe security weaknesses. This is potentially a very serious threat to the security, privacy and anonymity of their users. It is important to highlight that most steganography users have perfectly legal and ethical reasons to employ it. Some common scenarios would include citizens in oppressive regimes whose freedom of speech is compromised, people trying to avoid massive surveillance or censorship, political activists, whistle blowers, journalists, etc. As a result of our findings, we strongly recommend to cease any use of these tools, and to remove any contents that may have been hidden, and any carriers stored, exchanged and/or uploaded online. For many of these tools, carrier files will be trivial to detect, potentially compromising any hidden data and the parties involved in the communication. We finish this work by presenting our steganalytic results, that highlight a very poor current state of the art in practical video steganography tools. There is unfortunately a complete lack of secure and publicly available tools, and even commercial tools offer very poor security. We therefore encourage the steganography community to work towards the development of more secure and accessible video steganography tools, and make them available for the general public. The results presented in this work can also be seen as a useful resource for forensic examiners to determine the existence of any video steganography materials over the course of a computer forensic investigation.


2021 ◽  
pp. 1-16
Author(s):  
Michał Pawleta

This article aims to conceptualize the present state of public archaeology in Poland, which has recently become topical in archaeological practice. The author defines public archaeology and discusses the historical background of such activities in the context of the specific traditions of Polish archaeology. He then describes the main forms of outreach activities undertaken by archaeologists in Poland and presents community-oriented initiatives that go beyond the education of the general public about the past and strive to engage local communities in activities focused on archaeology and archaeological heritage. He concludes by outlining some directions that this sub-discipline may adopt in future.


2020 ◽  
pp. 088832542094109
Author(s):  
Klaus Bachmann ◽  
Igor Lyubashenko ◽  
Christian Garuka ◽  
Grażyna Baranowska ◽  
Vjeran Pavlaković

In recent years and decades, authoritarian regimes and illiberal democracies have passed and enforced punitive memory laws, intending to ban certain interpretations of past events or sheltering official versions of history against challenges. This comes with no surprise in countries whose governments undermine pluralism and assume the existence of a historical truth that is stable over time, invariable, and self-explanatory. But why do liberal democracies, committed to political pluralism and open debate, pass laws that penalize challenges to certain interpretations of the past and restrict freedom of speech? This article argues that liberal democracies may do so yielding to bottom–up pressure by courts and to regulate civil law disputes for which existing legislation and jurisprudence may not suffice. Based on case studies from Germany, France, Switzerland, Poland, Ukraine, Russia, Turkey, Rwanda, and the former Yugoslavia, we also found punitive memory laws in liberal democracies narrower and more precise than in nonliberal states.


Author(s):  
Carl E. Henderson

Over the past few years it has become apparent in our multi-user facility that the computer system and software supplied in 1985 with our CAMECA CAMEBAX-MICRO electron microprobe analyzer has the greatest potential for improvement and updating of any component of the instrument. While the standard CAMECA software running on a DEC PDP-11/23+ computer under the RSX-11M operating system can perform almost any task required of the instrument, the commands are not always intuitive and can be difficult to remember for the casual user (of which our laboratory has many). Given the widespread and growing use of other microcomputers (such as PC’s and Macintoshes) by users of the microprobe, the PDP has become the “oddball” and has also fallen behind the state-of-the-art in terms of processing speed and disk storage capabilities. Upgrade paths within products available from DEC are considered to be too expensive for the benefits received. After using a Macintosh for other tasks in the laboratory, such as instrument use and billing records, word processing, and graphics display, its unique and “friendly” user interface suggested an easier-to-use system for computer control of the electron microprobe automation. Specifically a Macintosh IIx was chosen for its capacity for third-party add-on cards used in instrument control.


2014 ◽  
Vol 7 (1) ◽  
pp. 1-25
Author(s):  
Jodie Eichler-Levine

In this article I analyze how Americans draw upon the authority of both ancient, so-called “hidden” texts and the authority of scholarly discourse, even overtly fictional scholarly discourse, in their imaginings of the “re-discovered” figure of Mary Magdalene. Reading recent treatments of Mary Magdalene provides me with an entrance onto three topics: how Americans see and use the past, how Americans understand knowledge itself, and how Americans construct “religion” and “spirituality.” I do so through close studies of contemporary websites of communities that focus on Mary Magdalene, as well as examinations of relevant books, historical novels, reader reviews, and comic books. Focusing on Mary Magdalene alongside tropes of wisdom also uncovers the gendered dynamics at play in constructions of antiquity, knowledge, and religious accessibility.


1997 ◽  
Vol 36 (4I) ◽  
pp. 321-331
Author(s):  
Sarfraz Khan Qureshi

It is an honour for me as President of the Pakistan Society of Development Economists to welcome you to the 13th Annual General Meeting and Conference of the Society. I consider it a great privilege to do so as this Meeting coincides with the Golden Jubilee celebrations of the state of Pakistan, a state which emerged on the map of the postwar world as a result of the Muslim freedom movement in the Indian Subcontinent. Fifty years to the date, we have been jubilant about it, and both as citizens of Pakistan and professionals in the social sciences we have also been thoughtful about it. We are trying to see what development has meant in Pakistan in the past half century. As there are so many dimensions that the subject has now come to have since its rather simplistic beginnings, we thought the Golden Jubilee of Pakistan to be an appropriate occasion for such stock-taking.


Author(s):  
Nicholas Owen

Other People’s Struggles is the first attempt in over forty years to explain the place of “conscience constituents” in social movements. Conscience constituents are people who participate in a movement but do not stand to benefit if it succeeds. Why do such people participate when they do not stand to benefit? Why are they sometimes present and sometimes absent in social movements? Why and when is their participation welcome to those who do stand to benefit, and why and when is it not? The work proposes an original theory to answer these questions, crossing discipline boundaries to draw on the findings of social psychology, philosophy, and normative political theory, in search of explanations of why people act altruistically and what it means to others when they do so. The theory is illustrated by examples from British history, including the antislavery movement, the women’s suffrage and liberation movements, labor and socialist movements, anticolonial movements, antipoverty movements, and movements for global justice. Other People’s Struggles also contributes to new debates concerning the rights and wrongs of “speaking for others.” Debates concerning the limits of solidarity—who can be an “ally” and on what terms—have become very topical in contemporary politics, especially in identity politics and in the new “populist” movements. The book provides a theoretical and empirical account of how these questions have been addressed in the past and how they might be framed today.


Author(s):  
Martha Vandrei

This chapter and the following both draw the reader into seventeenth-century understandings of the past, and of Boudica in particular, and makes clear that in a time before disciplines, writers of ‘history’ were erudite commentators, immersed in political thought, the classical world, and contemporary ideas, as well as in drama, poetry, and the law. Chapter 1 shows the subtleties of Boudica’s place in history at this early stage by giving sustained attention to the work of Edmund Bolton (1574/5–c.1634), the first person to analyse the written and material evidence for Boudica’s deeds, and the last to do so in depth before the later nineteenth century. Bolton’s distaste for contemporary philosophy and his loyalty to James I were highly influential in determining the way the antiquary approached Boudica and her rebellion; but equally important was Bolton’s deep understanding of historical method and the strictures this placed on his interpretive latitude.


Sign in / Sign up

Export Citation Format

Share Document