Publications

Results 51–60 of 60

Search results

Jump to search filters

Extracting hidden messages in steganographic images

Digital Investigation

Quach, Tu-Thach Q.

The eventual goal of steganalytic forensic is to extract the hidden messages embedded in steganographic images. A promising technique that addresses this problem partially is steganographic payload location, an approach to reveal the message bits, but not their logical order. It works by finding modified pixels, or residuals, as an artifact of the embedding process. This technique is successful against simple least-significant bit steganography and group-parity steganography. The actual messages, however, remain hidden as no logical order can be inferred from the located payload. This paper establishes an important result addressing this shortcoming: we show that the expected mean residuals contain enough information to logically order the located payload provided that the size of the payload in each stego image is not fixed. The located payload can be ordered as prescribed by the mean residuals to obtain the hidden messages without knowledge of the embedding key, exposing the vulnerability of these embedding algorithms. We provide experimental results to support our analysis.

More Details

A general model of resource production and exchange in systems of interdependent specialists

Beyeler, Walter E.; Glass, Robert J.; Finley, Patrick D.; Quach, Tu-Thach Q.

Infrastructures are networks of dynamically interacting systems designed for the flow of information, energy, and materials. Under certain circumstances, disturbances from a targeted attack or natural disasters can cause cascading failures within and between infrastructures that result in significant service losses and long recovery times. Reliable interdependency models that can capture such multi-network cascading do not exist. The research reported here has extended Sandia's infrastructure modeling capabilities by: (1) addressing interdependencies among networks, (2) incorporating adaptive behavioral models into the network models, and (3) providing mechanisms for evaluating vulnerability to targeted attack and unforeseen disruptions. We have applied these capabilities to evaluate the robustness of various systems, and to identify factors that control the scale and duration of disruption. This capability lays the foundation for developing advanced system security solutions that encompass both external shocks and internal dynamics.

More Details
Results 51–60 of 60
Results 51–60 of 60