{"title":"重新嵌入网络隐写分析的可行统计度量","authors":"Jun O. Seo, S. Manoharan, U. Speidel","doi":"10.1109/ITNAC55475.2022.9998399","DOIUrl":null,"url":null,"abstract":"Network steganalyses attempt to uncover hidden messages (steganograms) in network flows. These techniques are binary in that they classify if a flow contains steganograms or not. Moreover, most of these techniques assume the availability flows that do not contain any steganograms as baselines for comparison, an assumption that is hard to hold. A re-embedding steganalysis does not require any baseline, and moreover, it can not only detect the presence of steganograms but also estimate the amount of steganograms. Being able to estimate the amount of steganograms allows a network forensic expert to judge the damage caused by these hidden messages. This paper addresses the question of what statistical metrics might apply for effective re-embedding steganalysis of network traces. It presents an empirical comparison of several statistical metrics in the light of their effectiveness in re-embedding steganalysis.","PeriodicalId":205731,"journal":{"name":"2022 32nd International Telecommunication Networks and Applications Conference (ITNAC)","volume":"104 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"On Viable Statistical Metrics for Re-Embedding Network Steganalysis\",\"authors\":\"Jun O. Seo, S. Manoharan, U. Speidel\",\"doi\":\"10.1109/ITNAC55475.2022.9998399\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Network steganalyses attempt to uncover hidden messages (steganograms) in network flows. These techniques are binary in that they classify if a flow contains steganograms or not. Moreover, most of these techniques assume the availability flows that do not contain any steganograms as baselines for comparison, an assumption that is hard to hold. A re-embedding steganalysis does not require any baseline, and moreover, it can not only detect the presence of steganograms but also estimate the amount of steganograms. Being able to estimate the amount of steganograms allows a network forensic expert to judge the damage caused by these hidden messages. This paper addresses the question of what statistical metrics might apply for effective re-embedding steganalysis of network traces. It presents an empirical comparison of several statistical metrics in the light of their effectiveness in re-embedding steganalysis.\",\"PeriodicalId\":205731,\"journal\":{\"name\":\"2022 32nd International Telecommunication Networks and Applications Conference (ITNAC)\",\"volume\":\"104 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-11-30\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 32nd International Telecommunication Networks and Applications Conference (ITNAC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ITNAC55475.2022.9998399\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 32nd International Telecommunication Networks and Applications Conference (ITNAC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ITNAC55475.2022.9998399","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
On Viable Statistical Metrics for Re-Embedding Network Steganalysis
Network steganalyses attempt to uncover hidden messages (steganograms) in network flows. These techniques are binary in that they classify if a flow contains steganograms or not. Moreover, most of these techniques assume the availability flows that do not contain any steganograms as baselines for comparison, an assumption that is hard to hold. A re-embedding steganalysis does not require any baseline, and moreover, it can not only detect the presence of steganograms but also estimate the amount of steganograms. Being able to estimate the amount of steganograms allows a network forensic expert to judge the damage caused by these hidden messages. This paper addresses the question of what statistical metrics might apply for effective re-embedding steganalysis of network traces. It presents an empirical comparison of several statistical metrics in the light of their effectiveness in re-embedding steganalysis.