





Proposed Counter-Steganography System The filter system will need to be cost-effective, minimally intrusive and not prone to error. Since there may be many different steganography alghorithms, the filter system should not try to read such messages. Doing so will require an entire farm of filter servers. Instead, the systems will resort to a much simpler mechanism: Lena Söderberg ;) Here is our original imageThe filter system will need to be cost-effective, minimally intrusive and not prone to error. Since there may be many different steganography alghorithms, the filter system should not try to read such messages. Doing so will require an entire farm of filter servers. Instead, the systems will resort to a much simpler mechanism:

Modify all passing images so that the original hidden data is compromised. Use only minute changes to images, so that the original user expecting to see an image cannot discern any loss of quality in the image

The Test

In our test, we will be using the Lena

Söderberg test image and we will perform tests using 3 common image enhancement filters.

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Phasellus in risus erat

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Phasellus in risus erat

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Phasellus in risus erat

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Phasellus in risus erat

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Phasellus in risus erat

Söderberg with the message included





within it



After hiding the message inside the image, we'll pass the image through different enhancement filters and then try to extract the message from the filtered image.



1. Sharpen Filter

LoremJ� @�: ���Ѽsit�km t� consecf�t* ad piscin� u| tJ|�h s l����G�l�l� �h�z~� 5r�f�v��f�� ��j\)��5KT1��ķQo�s~cΓy?�� ɉ�C�$�� O�4E!L�r_x�߆��Ƥ �� b;��� \G;*W�.=� �1 楄 �M) Z*>֟ " °�N�(��%�J]u� � dRp �s���Χ �

G�?� e-e� E�͹g�� s�s�e�a�D� moF �O[t�h �ˀ2��i� _? � Լ�);c�s� & hD �� DF �ͬ�8Q��1T� Cr!�us� �F�j�l߫��M-�_�Y��i�$� DIHQ �u�g����?0 Xt �1c�� � ecTS � id_p�̦iG����Q�.�agaa��d��\�� ri u��

2. NF Filter

Lo�eB�ٷs��7,� o_� � � ]t,(;��Rec�(ξrg d�p_sc nw g)�t� �kK�?1� o�nJ�8 �0;֦a �4�Cr� <��` RorLP �W�jd Fol�4ix " v����oo��� �� �i@^���r� l� ����=� l>SsC�nP �ą�v�)��EyC G�� p `8�2��Ʃ&��t��\�Yr�� Is�&t�tD>�%.�pͮǿ ��T �Z� Mha�e&l�s ƾ��`s���Mc

3. Unsharp Mask

Error: The image that you tried to decrypt does not appear to have a message in it. It is possible that you entered the incorrect password. Please try again.

Conclusion

is still considered to be a part of the obscure tools of secret agents and corporate spies.However, steganography tools are widely available, and anyone can use them. Most of these tools are now available online. But a lot of systems currently perform some form of resampling or filtering of images.This poses an interesting challenge -This also gave us a great reason to publish another set of pictures (albeit cropped) ofWe will hide and open the message using the online tool at Mozaiq.Org Our operating assumption is that a higher redundancy of the message has a higher chance of survival through a filter. Thus, our test message is the following:Here is the image of Lena- The first filter to be tested is the Sharpen Filter. The filter is applied with Sharpness=2. After the application of the filter here is the image and the following message is extracted:- The second filter to be tested is the NF Filter. The filter is applied with default Alpha=0.30, and Radius=0.35. After the application of the filter here is the image and the following message is extracted:- The third filter to be tested is the Unsharp Mask. The filter is applied with Radius=1, Threshold=1 and Amount=0.1. After the application of the filter here is the image and the following message is extracted:Once an image passes through a filter, any hidden messages will be corrupted. Redundancy in the hidden message helps but only against some types of image manipulation and only at very low levels of the filter.Any digital picture retouch filter will damage the hidden message within a steganography image.Naturally, this conclusion is nothing new - but through this test we can conclude that a small and very visually non-disruptive filter can cause a lot of damage to a steganography image.Now go and check whether your outbound filters do something like this :)