Analysis and Categorical Application of LSB Steganalysis Techniques

ABSTRACT

Many tools and methods for steganalysis are prevalent in the research field. While no technique is 100% effective, combining multiple techniques is common practice. Techniques reliant on the same basis are often found to be less computationally efficient when used in combination as opposed to the combined use of techniques in separate categories. It is the goal of this paper to present many of the foundational techniques, explore their strengths and weaknesses, categorize the techniques, and present further theories on the combinational effectiveness of techniques within and outside of those categories.


AUTHORS

School of Computing, University of South Alabama, Mobile, AL

Josh Cazalas earned his B.S. in Computer Science in 2011 and his M.S. in Computer Science in 2014 from the University of South Alabama. As a Master’s student, Josh was active in the DoD Cyber Crime Center’s Digital Forensic Challenge and was on the first-place graduate team and sixth overall for the competition in 2012. His research interests include malware analysis, reverse engineering, virtualizing software protection, and network security.

Photo of Dr. Todd R. Andel

School of Computing University of South Alabama Mobile, AL
U.S.A

Dr. Todd R. Andel is a Professor at the University of South Alabama’s School of Computing. He previously served on the faculty of the Department of Electrical and Computer Engineering at the Air Force Institute of Technology from 2007 to 2012.  He is a retired major in the U.S. Air Force, serving more than 23 years specializing in cyber systems defense, research, and education.  He has published more than 50 peer-reviewed papers related to computer and information security, side-channel analysis, embedded systems security, network security protocols, and formal methods. He earned a bachelor’s degree in Computer Engineering from the University of Central Florida (1998), a master’s degree in Computer Engineering from the Air Force Institute of Technology (2002), and a doctorate in Computer Science from Florida State University (2007). He is a senior member of the Institute of Electrical and Electronics Engineers (IEEE) and a senior member of the Association for Computing Machinery (ACM).

Dr. Jeffrey "Todd" McDonald

School of Computing University of South Alabama Mobile, AL
U.S.A

Dr. J. Todd McDonald is a Professor of Computer Science in the School of Computing at the University of South Alabama. He earned a bachelor’s degree in Computer Science from the U.S. Air Force Academy, a master’s degree in Computer Engineering from the Air Force Institute of Technology, and a doctorate in Computer Science from Florida State University. His primary research interests include software and hardware protection, systems assurance and vulnerability assessment, and secure software engineering.

Journal of Information Warfare

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

Quick Links

View the latest issue of JIW.

Latest Edition

Purchase a subscription to JIW.

Subscribe

Keywords

A

AI
APT

C

C2
C2S
CDX
CIA
CIP
CPS

D

DNS
DoD
DoS

I

IA
ICS

M

P

PDA

S

SOA

X

XRY

Quill Logo

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

SUBSCRIBE NOW

Get in touch

Registered Agent and Mailing Address

  • Journal of Information Warfare
  •  ArmisteadTEC
  • Dr Leigh Armistead, President
  • 1624 Wakefield Drive
  • Virginia Beach, VA 23455

 757.510.4574

 JIW@ArmisteadTec.com