Forensic analysis of video steganography tools

View article
PeerJ Computer Science
Note that a Preprint of this article also exists, first published April 30, 2015.

Introduction

Steganography is the art and science of hiding information in plain sight. By ensuring that data is hidden from casual observers, a stego-system aims to reduce any suspicion that a third party may have over occurring communication. This can be a valuable resource where free speech is not guaranteed. In this and many other related contexts, steganography provides an ideal solution which makes it possible to avoid censorship (Krenn, 2004). An ideal stego-system should typically allow for highly sensitive information to be securely exchanged without the knowledge of others.

Recent research interest towards steganography focuses primarily on applications in the digital domain (Judge, 2001). Those provide a way for users to embed messages within files on a computer or a digital device. This process is typically carried out by identifying and manipulating redundant data in a file, so that any changes made are indiscernible through inspection. Modern digital stego-systems embed data through a variety of data hiding techniques such as image, audio and video steganography (Balgurgi & Jagtap, 2012). A rising interest in video steganography can be linked to the significant benefits it offers over alternative media formats. The pervasive nature of video, along with an increased embedding capacity, make it an ideal candidate. As a result, video steganography has benefited from rapid progress in the academic domain (Balaji & Naveen, 2011). Unfortunately, publicly available tools do not reflect these academic advances, as we will show in the following. Most new and secure algorithms are only developed as a proof of concept tool in academic environments and do not lead to more secure tools that are accessible for the greater public.

The main contributions of this paper are:

  • We examine a number of video steganography applications, both commercial and free. The list of analysed tools is comprehensive, as far as we know, with the exception of OpenPuff and MSU StegoVideo. For the tools discussed, we investigate and expose security-relevant characteristics.

  • We show that all the tools discussed can be attacked, and in all cases it is possible to detect the presence of hidden contents. But even more powerful attacks are possible for certain applications: For example, in one particularly worrying case, it is feasible to extract the full hidden contents, without the need of the secret key.

  • We show how simple scripts can be used to detect vulnerable embedding algorithms, and briefly discuss the impact of these weaknesses within the forensic domain.

  • Furthermore, we provide recommendations on how these issues can be resolved.

There is currently a total lack of awareness on the insecurity of these tools, so it is therefore intended for our work to provide enough technical insights to justify our very strong recommendation against using these tools.

Steganography

The purpose of steganography is to conceal the existence of communication. Modern steganography is typically carried out by manipulating data within carrier files. This concept can apply to a wide variety of file formats, as steganography is generally applicable to all data objects that contain some form of redundancy (Provos & Honeyman, 2003). However, media files are frequently ideal candidates as their pervasive nature will keep their true intent unnoticed by observers. Making use of the internet for file sharing, for instance, allows these carrier files to be sent and received with ease and without raising suspicions.

There are numerous embedding techniques that allow a user to hide data in a given object (Channalli & Jadhav, 2009). However, the general process of embedding data can be summarised in a few simple steps (as shown in Fig. 1). Firstly, the communicating parties must agree on a stego-system and a shared secret key that will be used to determine the embedding algorithm. Once this has been achieved, the embedding algorithm will identify data within the file that is to be modified (these can be redundant bits). These bits are then replaced with the contents from the secret message that is to be embedded within the carrier file. As a result, analysis of a stego-file without knowledge of the key should not reveal the presence of steganography, therefore avoiding suspicion and keeping the hidden contents secure. In most cases, the hidden message will be encrypted prior to embedding.

The general process of steganography.

Figure 1: The general process of steganography.

Video steganography & steganalysis

Although still a relatively new research area, the field of video steganography has shown promising progress in recent years. A growing interest in the topic can be related to the many advantages that follow the use of a video file for hiding contents. Video steganographic techniques can provide the user with increased potential for capacity, transferability and most importantly imperceptibility (Dasgupta, Mondal & Dutta, 2013). Due to the ubiquity of video media throughout the internet, video steganography can prove to be a valuable resource to those who need to ensure their data is kept private. At present, only a small number of tools exist for public use in the form of both commercial and free software.

On the other hand, a very large number of steganography tools for other carriers are available. For example, the BackBone Steganography database lists fingerprints for over 1,000 applications (BackBoneSecurity, 2014).

With so few video steganography tools available, the security that these applications offer must be thoroughly examined. With them potentially providing for a large number of users, it is critical to ensure they are protecting data appropriately. If serious security vulnerabilities are found, as we argue in the rest of this paper, then awareness needs to be raised and their use discouraged to limit damage to its rightful users.

Video steganography can be a valuable resource for those who need to ensure that their communications remain private and secure. Most of the times, steganography will be employed for perfectly legitimate reasons. A good example are whistle-blowers, journalists, political activists, and basically anyone living in an oppressive regime where freedom of speech and individual rights are at stake. However, it is unfortunate that the advantages of steganography have been also of use to criminals and terrorists. In 2011, the German newspaper ‘Die Zeit’ (Gallagher, 2012) reported that an Al Qaeda agent had been intercepted with a memory card containing steganographic material documenting future plans within a video file. Research by certain criminal groups is leading to the development of new steganographic technology (Hosmer, 2012).

Current academic research in the field of video steganography explores techniques and embedding algorithms for securely hiding data within video files. The invasive nature of steganography typically leaves traces in a carrier file that can be detectable through careful analysis (Provos & Honeyman, 2003). Steganalysis follows this theme, to try and identify the presence of hidden content. State of the art techniques explore the temporal correlation between frames (Meghanathan & Nayak, 2010); however, this approach relies on tools that specifically embed data within the image frame. For a more in-depth presentation of the last advances in the matter, please check the Literature Review section.

Statistical analysis provides a way to examine the statistical properties of a carrier file for deviations that apply to a wide variety of embedding algorithms. Signature steganalysis is performed by identifying consistent, repetitive patterns embedded by a steganography tool (Mandal, 2012). Together, this approach provides an ideal method of attack against these tools, as it is typically applicable to a variety of embedding algorithms.

The steganalytic techniques used in this paper are typically in the remit of forensic steganalysis. This approach aims to discern the embedding algorithm of a stego-system, and to develop methods to distinguish between original and stego-content (Fridrich, 2009). Our method for examining stego-systems can also be defined as system steganalysis, as it exploits vulnerabilities within the tool implementation to detect the presence of steganography. The importance of these techniques is that they can drastically simplify the steganalytic process, and reveal crucial information surrounding a particular embedding algorithm.

Literature Review

A steganographic technique that we consider promising and has attracted quite a lot of academic interest over recent years is motion vector steganography. A motion vector is a key component of the motion estimation process. This embedding technique exploits the internal dynamics of video compression to hide messages (Cao, Zhao & Feng, 2012). It benefits from high capacity for data hiding whilst maintaining excellent video quality (Pan et al., 2010). This steganographic approach has been subjected to quite heavy academic scrutiny, which has consequently lead to a number of interesting steganalysis results. Research carried out by Zhang, Su & Zhang (2008) analysed statistical properties introduced by motion vector embedding to effectively detect motion vector based algorithms. Despite the current attacks, we still believe this approach offers promise, and will become a major embedding strategy in the future.

One of the many advantages of video steganography is that well-known embedding techniques for image and audio are also typically applicable to video. Research has been carried to bring the popular DCT steganographic technique to video. A system was proposed by Bodhak & Gunjal (2012) that embeds data through the manipulation of DCT coefficients. This method offers both imperceptibility against the original source and security of the embedded contents through encryption.

Although these proposed techniques highlight advancements in the field, they remain mainly theoretical and rarely make it to an implementation stage, particularly outside platforms such as MatLab, Maple, Mathematica, etc. This results in many of the tools available for the general public not being reflective of the latest academic developments in the area.

There was, however an interesting exception to this, though not a very successful one: An academic video steganography tool was released by researchers at Moscow State University called MSU StegoVideo (Dmitriy Vatolin, 2007). This was one of the first video steganography tools subjected to academic steganalysis and has received significant interest. MSU StegoVideo is one of the first video steganography tools to embed data directly in the video stream, for which it is recognised as offering true video steganography. However, the tool is not open source (not good security-wise) and no details were provided by the author concerning the embedding algorithm (this is a terrible security practice, and a clear example of security-by-obscurity). Therefore, researchers interested in attacking the tool had to carry out some reverse engineering and frame-based analysis to properly understand the embedding mechanisms (Wu et al., 2010). After that, DCT-based steganalytic attacks have been used to successfully detect MSU StegoVideo (Kancherla & Mukkamala, 2009).

Dismantling Tools

Security vulnerabilities within any type of software are always a concern, and addressing them should be a matter of priority. This is even more evidently the case when dealing with vulnerabilities in security software.

Steganalysts attempt to detect, estimate and, if possible, extract hidden content within carrier files (Das et al., 2011). However, in certain cases where a tool shows weaknesses on a more fundamental level, direct attacks against the software can provide even more compromising results. This method of forensic and system steganalysis is our primary approach towards the analysis of the tools discussed throughout this paper.

We will focus on six video steganography tools (StegoStick, OurSecret, Masker, OmniHide Pro, BDV DataHider and Max File Encryption) that we prove offer a dangerously outdated and insecure embedding mechanism known as EOF data injection.

Embedding algorithms

Across the nine video steganography tools we have identified, and that to the best of our knowledge covers all available tools for the general public, only three distinct embedding algorithms are in use, namely EOF Injection (by the six tools listed previously), metadata (by OpenPuff) and DCT (by MSU). The limitations of the DCT implementation in MSU StegoVideo have been shown, notably, in Wu et al. (2010). We have presented similar powerful attacks (Sloan & Hernandez-Castro, 2015) against OpenPuff. In the rest of the paper, we will show the inherent vulnerability of the EOF Injection technique, thus completing a quite worrying view of the current security of video steganography tools.

Data injection tools

A total of six video steganography tools have been identified that employ EOF injection techniques (OurSecret, OmniHide Pro, Masker, StegoStick, BDV DataHider, and Max File Encryption). Many of their embedding approaches have similarities on both obvious and subtle levels. Most importantly, all six tools just embed data at the end of the file. This allows for the hidden content to be easily identified and it becomes possible to use this data to examine and reverse engineer the functionality of a given tool. In many cases, certain strings may be embedded into a carrier file that appear consistently throughout multiple hidden files. The consistency and the length of these strings provide a valuable means in which a carrier file alerts to the presence of steganography, and also links the carrier file to the respective tool. These are known as signatures, and are considered to be a very significant weakness in steganography tools.

We can perform this analysis despite these tools being proprietary and not including any kind of source code for analysis.

Table 1 provides a basic insight into the popularity and accessibility of the six tools examined throughout this paper. Our count for the number of downloads was taken as of 07/04/2015.1 Through an observation of the downloads across multiple download sites, we noticed that many of these tools are still downloaded each week, showing they are currently in use.

Table 1:
Summary of EOF injection tools.
Toolkit Price/downloads Resource location
OurSecret v2.5.5 (12/06/2012) Free/230,000+ http://www.securekit.net/oursecret.htm
OmniHide Pro v1.0 (16/08/2011) $8/18,000+ http://omnihide.com/
Masker v7.5 € 59/16,155+ http://www.softpuls.com/masker/
StegoStick Beta (16/06/2008) Free/6302+ http://stegostick.sourceforge.net/
Max File Encryption v2.0 (19/07/2013) Free/3606+ http://www.softeza.com/fileencryption/
BDV Data Hider v3.2 (01/06/2010) $14.99/N/A http://www.bdvnotepad.com/products/bdv-datahider/
DOI: 10.7717/peerj-cs.7/table-1

OurSecret

Formerly simply called ‘Steganography,’ OurSecret provides the capability for video steganography on a wide variety of video formats. Currently on version 2.5.5, this tool offers an option for password based file protection, upon which users can only access embedded content by presenting the correct password. As freeware, the OurSecret tool imposes no restrictions or limitations on functionality. Research carried out by Adonis in 2007 identified a weakness within previous versions of this tool (affecting v. 1.7.1 and 1.8) that allowed an attacker to replace the user password with their own to extract embedded contents. However, this vulnerability as discussed seemed to be limited to JPEG images only (Adonis, 2007).

Similar to the vulnerability identified by Adonis in 2007, it is possible to extract the full embedded contents from a video file modified by OurSecret. In the absence of a password, the embedding algorithm will use a fixed 16-byte string to reflect this. This is a critical vulnerability. As this 16-byte hexadecimal string is used in place of a user-provided password, an attacker can simply copy this value into any OurSecret encoded files using a hex editor and bypass the user provided password with this null-password string. This simple modification will deceive the tool into recognising a carrier file as having no password requirements. As a result, the attacker is then be able to access and extract the full hidden contents. We denote this as a Null-Password Vulnerability.2

Figure 2 illustrates the Null-Password exploit in practice. These are the final 26 bytes of a file modified by OurSecret. The highlighted bytes are the Null-Password replacing the original 16 bytes of a file that were injected by OurSecret. This simple exchange grants the attacker full access to the hidden contents with no need for the secret key.

Null-password replacing any previous user password.
Figure 2: Null-password replacing any previous user password.

In addition, it is possible to observe a consistent 40-byte string, as shown in Table 2. This is a sequence of hexadecimal characters that occurs within all OurSecret modified video files, across all formats and encoding options. We can therefore classify this as a valid signature to identify the existence of any contents hidden with OurSecret. This signature appears directly after the final byte of an unmodified file. This is a fundamental vulnerability with the embedding algorithm, that compromises the security of a users data by informing attackers not only that steganography has been used on a video file, but also which steganography tool has been employed.

Table 2:
OurSecret signature.
9E 97 BA 2A 00 80 88 C9 A3 70 97 5B A2 E4 99 B8 C1 78 72 0F
88 DD DC 34 2B 4E 7D 31 7F B5 E8 70 39 A8 B8 42 75 68 71 91
DOI: 10.7717/peerj-cs.7/table-2

In the light of the vulnerabilities we have identified within OurSecret, it is apparent that this tool is unsuitable for use in any circumstances. The identification of a unique signature will allow attackers to detect the presence of OurSecret steganography. Furthermore, by exploiting the null-password vulnerability, an attacker is capable of recovering all hidden information.

OmniHide Pro

OmniHide Pro is a commercial product capable of embedding data within image, audio, video and other media. Released in 2010 for the Windows operating system, OmniHide offers a Trial and a Pro version, although the former provides only limited functionality. OmniHide Pro costs $8, and will provide the user with all the tools’ features. In the following, we will only examine the Pro version.

To study the embedding algorithm, we apply a similar testing framework to the one employed for OurSecret. Figure 3 shows a carrier file through an hexadecimal editor. It reveals a similar embedding algorithm to OurSecret, also employing EOF data injection. Reviewing the offset for where the unmodified file would have ended, it is apparent that the OmniHide Pro tool also suffers from several vulnerabilities that can compromise the security of a user’s data. OmniHide embeds information within videos by appending the data directly to the end of the file. The first sequence of bytes are followed by a string of white space characters. These are reserved bytes to be replaced by longer file names that are embedded into the carrier.

First 11 bytes of embedded content.
Figure 3: First 11 bytes of embedded content.

Figure 4 shows how we could identify the name of the text document embedded within the video. For the purposes of these tests we embedded a file called ‘ATest.txt.’ This converted ASCII is the first string of identifiable information. Using a hex viewer, this data is subsequent to the offset in which the unmodified file would have ended. The presence of a file name that is so easily identifiable within a carrier file, raises many security concerns. For example, if an attacker has access to the user’s computer, it may be possible to identify the initial file still present in a plain text format. It is best practice for steganography tools to fully encrypt a file before embedding. This provides an additional layer of security and will make it more challenging for any attackers to identify the existence and location of hidden contents, and to recover them. OmniHide Pro clearly lacks this fundamental feature.

Hex string of embedded data, converted to ASCII.
Figure 4: Hex string of embedded data, converted to ASCII.

Further examination of OmniHide Pro revealed other characteristics of the embedding algorithm that can be considered as security weaknesses from a steganalytic perspective. As the file size of the carrier increases proportionally to the embedded content, it is apparent that no compression is taking place during the embedding process. This is again against recommended best practice, as file compression should be used to reduce the size of embedded contents. Figure 5 captures the end of file characteristics of data injected by OmniHide Pro (approximately 19MB). This reflects the size of the carrier file prior to data injection. A subtraction between these two values will allow any attacker to quickly and accurately calculate the size of the injected hidden contents.

File size of the unmodified carrier.
Figure 5: File size of the unmodified carrier.

OmniHide Pro inserts a large amount of whitespace to the file where the initial injection begins, as shown in Figure 3, where the repetition of ‘20’ (hex for space) is evident. This occurrence of repeated data is highly unusual in MP4 files, and leaves the carrier vulnerable to steganalysis. We developed a script (as shown in Appendix A) that can be used to exploit this weakness to detect the presence of OmniHide Pro video steganography, with 100% accuracy. In addition, pseudo-signatures can be formed through the extraction of data such as the injected file size.

Masker

Masker is a commercial application that claims to offer secure video steganography. The latest stable format, version 7.5 was released in 2009 and can be accessed as either an evaluation version for a limited period of time, or alternatively, can be purchased for € 59. Masker provides the option of several different encryption algorithms to secure user data, this includes: Blowfish, CASTS, DES, Serpent-256, AES-256, TripleDES and TwoFish. Masker does not work over MP4 files, but is capable of processing the following file formats: AVI, MOV, MPG, MPEG, ASF, MPA and MPE. We have been able to identify several weaknesses when examining the functionality of this tool. It is apparent that Masker shares many vulnerabilities with the previously discussed tools. Analysing an AVI file with a small amount of embedded content, it is apparent that Masker also employs EOF data injection.

Figure 6 illustrates the EOF injection technique adopted by Masker. The first 10 bytes in the image are the final part of the source file. The highlighted bytes reflect the start of Masker’s embedding. Using a hex viewer, these EOF injection algorithms are trivial to detect and exploit.

Masker embedding.
Figure 6: Masker embedding.

Similarly to OurSecret, it is possible to identify a distinctive sequence of bytes that can uniquely characterise the embedding algorithm. This is consistent across the varying embedding options, irrespective of the encryption algorithm used or the choice of secret key. We can consider this string to be a signature for the Masker steganography tool and, due to its unusual length, it will ensure a high detection rate.

Table 3:
73-byte Masker signature.
9E 8D DB 50 73 C2 BF 65 B8 1E 03 AE D5 62 C6 CC 71 9A B9 B9 48 49 D2 64 EE
49 B7 63 7B EF EB A1 01 04 40 7B F0 ED 2D 86 47 E1 5F FC 7C 41 C9 8B C9 02
CA 1C 07 21 EE 8D 32 66 47 7C 8F E1 4E E8 AE 66 AB 32 E3 D2 F9 A1 0E
DOI: 10.7717/peerj-cs.7/table-3

The signature captured in Table 3 shows a 73-byte string that appeared throughout every test we carried out on Masker. This consistency of injected data opens the Masker tool to exploitation, essentially breaking the tool from a steganalytic perspective. Similar to a vulnerability within OmniHide Pro, we were able to identify bytes that reflect the size of embedded contents.

Having identified the existence of a signature, it is possible to create a simple script to detect the presence of steganography. An automated script would be easily capable of detecting a signature with a length of 73 bytes to a high degree of accuracy. From an academic perspective, this type of vulnerability complete breaks the tools capability for secure steganography. In ‘Signature steganalysis’ we further discuss our approach towards signature steganalysis based on the strings that have been captured.

Max file encryption

Max File Encryption is a cryptographic tool with video steganography capabilities. The current version is 2.0, released on 07/2013. Analysis of Max File Encryption using the aforementioned test framework has provided similar discouraging results and illustrate many of the same mistakes. By employing EOF injection, it displays a concerning number of weaknesses. Upon inspection on a hex editor, it is apparent that the carrier file contains key components of the program, such as the libraries and public key tokens used, and other artifacts. Not only this can lead to a large number of signatures, it is also possible to identify key parts of the program source code through this.

Figure 7 identifies an embedding characteristic identical to that of OmniHide Pro. This tool injects information illustrating the file size of the unmodified carrier. This provides an attacker with the opportunity to estimate the size of embedded content. Provided an attacker has access to the source computer, it may be possible to identify the hidden file, generally the only one matching that exact size.

File size of embedded contents.
Figure 7: File size of embedded contents.

Max File Encryption appears to be another generic EOF injection tool containing a number of already familiar vulnerabilities, that turn it into a very insecure stego system.

StegoStick

StegoStick is a freeware steganography tool that claims to have the capability to hide any file type into any other file type. This concept, although appealing, is significantly less tempting when realising it also employs EOF data injection. The current release is a beta version from 08/2013. At present, our examination of the tool has not revealed any consistent string that can be used for the detection of StegoStick steganography. The only recoverable information that could be extracted from the tool identifies the files types embedded into the video.

Figure 8 shows an ASCII representation of hex data captured from a StegoStick carrier file. We embedded varying file types such as .pdf and .txt into video files, these were identifiable during our analysis of the tool. The ability to extract embedded file types can provide small insights such as what file types to look for on a suspect computer. Although this tool uses EOF injection, which is again a very poor form of steganography, StegoStick does apparently not have the same number of security issues found in the previously analysed tools.

StegoStick embeds the file type of hidden data.
Figure 8: StegoStick embeds the file type of hidden data.

A stronger steganalytic attack against StegoStick is briefly presented in ‘Generalising EOF injection attacks,’ where we describe a general approach that works against all examined EOF tools.

BDV DataHider

BDV DataHider is a commercial steganography application developed by Bedavlad Software. The most recent release is 3.2, available from 06/2010. This tool can be purchased for $14. Similar to alternative video steganography tools, BDV DataHider employs EOF injection techniques. The developers express high confidence in the quality of the tool and state “There is nothing more powerful on the market when you want to transfer unnoticeably (sic) some files over Internet or on a flash drive” (Software, 2010). However, it is apparent that the embedding algorithm features very similar weaknesses to those previously exposed. A major identifiable vulnerability is provided by the tools’ interface.

As illustrated through Fig. 9, BDV DataHider will inform any user if a file contains the presence of BDV DataHider steganography. Upon adding a carrier file to the GUI, the message “This file contain Secret Storage” will be shown. This demonstrates that there is the potential to acquire a signature from the tool. At the time of writing this paper, a consistent signature has yet to be identified.

Data Hider provides its own detection system.
Figure 9: Data Hider provides its own detection system.

Again, we have a more powerful and general attacks against BDV DataHider, that will be briefly discussed in ‘Generalising EOF injection attacks.’

Signature steganalysis

The identification of signatures for several of the video steganography tools analysed should be a cause for concern. We were able to develop simple but efficient and accurate scripts to detect these signatures within carrier files. We show this in Appendix B, this is tailored primarily towards the detection of OurSecret by exploiting the identified signature. However, it can be easily modified to detect similar tools by changing the signature that it looks for within the script. We found that these signatures provided 100% accuracy when attempting to detect the presence of video steganography. These tools should be considered completely broken from a steganalytic perspective, and users should stop using them immediately. We cannot, unfortunately, offer a secure alternative because both OpenPuff and MSU StegoVideo are also vulnerable to steganalysis, and the EOF Injection approach is flawed beyond repair.

Generalising EOF injection attacks

Steganography performed through EOF data injection is totally insecure. Not only is detection trivial, but the resulting deviation in a files’ statistical properties can leave a carrier file susceptible to a number of other, more powerful attacks.

If an attacker can automate a script to examine data injected at the end of a video file, it is possible to design a general attack against all of these tools. We tested this idea and, in each case, found it was possible to detect with perfect accuracy any EOF injection technique used the six tools previously discussed in this paper.

This provides a quick and general method for detecting this type of steganography, and emphasises how poor these algorithms actually are. The only shortcoming to this attack, however, is that when compared with signature steganalysis it will not be able to link the carrier file to the tool used. On the other hand, this generalised attack (shown in Appendix C) can be used reliably against BDV DataHider and StegoStick, where we were unable to find a consistent signature.

Summary of Findings

Throughout this paper, a total of six video steganography tools have been examined and evaluated. Multiple weaknesses have been identified across them, capable of seriously compromising users’ data. In this section, we provide a brief summary of our findings in Table 4, highlighting the vulnerabilities discovered.

Table 4:
Summary of the vulnerabilities found.
It is important to note that all tools were also vulnerable to our generalised EOF detection algorithm.
Toolkit Embedding algorithm Vulnerabilities identified
OurSecret Data injection—EOF 40-byte signature, full retrievable contents with null password
OmniHide Pro Data injection—EOF Recover hidden filename and size, found pseudo-signature
Masker Data injection—EOF 73-byte signature, hidden file size can be determined
StegoStick Data injection—EOF Hidden file type recoverable
Max File Encryption Data injection—EOF Multiple signatures
BDV Data Hider Data injection—EOF Auto detection within the tool
DOI: 10.7717/peerj-cs.7/table-4

We discovered that in all cases it is possible to isolate the embedding algorithm and develop detection methods against these tools. In this paper, we demonstrate how a warden can detect the presence of steganography within a video file. Following the identification of consistent signatures throughout several of the tools, scripts can be developed for the detection of hidden contents. The generalised attack against EOF injection was able to successfully identify the presence of video steganography across each of the tools discussed in this paper. Usage of any of these tools must stop immediately.

Conclusions and Future Work

The findings in this paper emphasise the poor state of existing video steganography tools, highlighting how the use of simple signature-recognition scripts is enough to break a number of these applications. We have identified severe security vulnerabilities within each of the video steganography tools examined. We believe the described findings, together with the scripts accompanying this paper, will be useful for forensic practitioners searching for video steganography in their investigation. With only a handful of video steganography tools currently available, our findings are likely to affect a large number of video steganography users. We believe it is crucial to raise awareness into the inadequate security of these tools.

To further evaluate the merits of this approach, but also to investigate the prevalence of video steganography usage on the internet, we are currently working on a general framework, the Steganalytic wEbrEsearch frameworK (SEEK).3 We also plan to address other forms of video steganography, and to add DCT and motion vector detection to the framework. We also hope that showing the current poor state of affairs in publicly available video steganography will contribute to the future development of new and more secure tools. The case of MSU StegoVideo is a good example of academic progression for usable tools. Future tools should also pay more attention to include academic developments, and implement tried and tested techniques instead of ad-hoc algorithms.

Supplemental Information

Appendix S1

Signature detection script for OurSecret.

DOI: 10.7717/peerj-cs.7/supp-1

Appendix S2

Generalised EOF detection script.

DOI: 10.7717/peerj-cs.7/supp-2

Appendix S3

OmniHide Pro script 1.

DOI: 10.7717/peerj-cs.7/supp-3

Appendix S4

OmniHide Pro Script 2.

DOI: 10.7717/peerj-cs.7/supp-4
Many of the tools listed in Table 1 do not show the number of downloads on their host site or any other centralised form, so we gathered these figures from a number of downloading sites and added them up. We can safely assume that the actual number of downloads is significantly higher that the figures shown here.
This vulnerability is an improvement to the JPEG exploit as referenced on CVE-2007-0163, where this weakness was not mentioned.
See http://thomassloan.com/my-research/.
12 Citations   Views   Downloads