On using Emoticons and Lingoes for Hiding Data in SMS
|
|
- Jessica Marsh
- 6 years ago
- Views:
Transcription
1 2015 International Symposium on Technology Management and Emerging Technologies (ISTMET), August 25-27, 2015, Langkawi, Kedah, Malaysia On using Emoticons and Lingoes for Hiding Data in SMS Vahab Iranmanesh* 1, Ho Jing Wei 1, Sean Lee Dao-Ming 1, Olasimbo Ayodeji Arigbabu 1 Department of Computing and Information Systems Faculty of Science and Technology Sunway University Bandar Sunway, Selangor, Malaysia *vahab.iranmanesh@gmail.com, { , }@imail.sunway.eud.my, oa.arigbabu@gmail.com Abstract SMS is widely used as a daily communication service among people around the world. As such, SMS is a suitable means that can be readily exploited for transferring secret messages between individuals in a less conspicuous way. In this paper, we present an investigation on the suitability of hiding secret message in SMS. The hidden data are represented as lingoes and emoticons which are frequently used by users in SMS and chat. As a result, a pre-shared list, which is common between the sender and receiver is used to embed, and later extract the secret message in SMS in a natural form. The proposed method is implemented and tested on Android based mobile device, and showed some desirable outcomes. Keywords - Data hiding; SMS steganography, Emoticons; lingoes I. INTRODUCTION Ever since the invention of the first mobile phone in 1973, mobile phone has become a universal means of communication among individuals, and it is one of the most utilized technologies on a daily basis. In fact, almost every individual around the globe owns at least one mobile phone. Over the years, mobile phones have evolved from being just an accessory, to becoming a necessity in most people s lives. Probably one of the easiest and most widely used methods of communication present in mobile phones is a short message service (SMS). By definition, SMS is the transfer and exchange of short text messages using 160 characters [1] between two mobile phones. It has a short time of transferring messages and also low cost [2]. However, one of the main issues with the use of mobile phones is the security and privacy of the information, since it is not a wired communication. Mobile phone spying is a well known crime and interception or recording of messages between two mobile phones is one of these methods commonly used [3]. Another example is phone cloning that also allows an attacker to intercept incoming messages and send outgoing messages as though the phone is the original one [4]. Due to the susceptibility of mobile phones to these kinds of intrusions, several solutions such as cryptography and steganography are needed to ensure information is not trivially compromised. Steganography is a method used for hiding data within other data, and has gained prominence in recent years. In steganography, the main goal is to hide data within a cover media, such that, only the sender and receiver can understand the hidden information. The cover medium refers to the media in which the data are embedded and can be in the form of text, images, or audio files [5]. Moreover, one of the main benefits of using steganography over cryptography is that, cryptography is obvious to the observers that there is a hidden message, whereas in steganography, the secret message is hidden in the cover media, to make it look inconspicuous and only the receiver would have the right key to extract the secret message [6]. As a matter of fact, text is the most difficult media due to less redundant information in the file [7]. Any changes in the media will affect the structure of text and eventually lead to retrieval of the secret message. II. RELATED WORKS Unlike other steganography approaches, studies on data hiding in short message service (SMS) are quite limited. The first investigation on SMS steganography was reported by Shirali-Shahreza [8], which utilized image as cover media and SMS as carrier to transfer the hidden message to the recipient. In this method, a black and white (B&W) image is used to transfer the hidden message by changing the intensity of pixels. However, low capacity (27 bytes) is the main drawback of the mentioned technique, due to the use of only black and white image rather than using full colour. The study presented in [9] exploited abbreviation or full form of words such as "u" for the meaning of "you", and "univ" for "university" to hide the secret message in the SMS. For example, to hide 01, the abbreviation form of the word (u) is used to embed value 0, whereas the full form (you) is utilized for embedding value 1. The main limitation of this method is very low payload capacity and easy extraction. Further, the static form of the word abbreviation list is removed by introducing computationally light weighted exclusive or (xor) encryption in [10]. The method has the capability to swap the abbreviation and full form words in the statistic table in conjunction to the stego key as an additional /15/$ IEEE 103
2 security layer, which makes the data difficult to retrieve by an attacker. In [11], the image is used to hide software activation code based on the steganography technique proposed in [8] and then send the image to the recipient through SMS. The new method didn't show any significant improvements to their previous method rather sending activation code. The use of Sudoku game is another interesting technique proposed by Shirali-Shahreza [12], where the recipient receives an unsolved Sudoku puzzle to solve in order to retrieve the hidden data from the puzzle. In this case, the arrangement of numbers from 1 to 9 on the puzzle is exploited as features to embed the secret message, and later, two key values as the location of embedding row and column are also sent to the receiver along with the SMS to extract the hidden data. Since the embedding locations can only be 2 places (2 cells) in Sudoku puzzle with 9 bits per cell, it can embed very short messages such as 18 bits (9 bits per cell). As it is suggested by the same author, expanding Sudoku puzzles in bigger size such as instead of 9 9 cells, the more secret message can be embedded. Using Least Significant Bit (LSB) for hiding data on the colour image for the bank customers is introduced in [13]. Since human eyes cannot distinguish the slight changes in blue colour, two bit value of blue pixel is used for coding one byte of data. Moreover, the customers of banks are required to use a particular mobile banking application to receive SMS for downloading the image file that contains hidden data from the bank website. Then, the decoder goes through the downloaded image to extract the hidden data based on LSB method. For having additional security, a password function is developed before reading the image file in mobile application. However, the main limitation of the mentioned technique is using the LSB method in time domain which can be altered through channels such as filtering. However, high payload capacity is an advantage of the this technique, since several pixels within the colour image are used for hiding the data. Bhaya [14] proposed using proportional fonts to hide sensitive data which cannot be easily recognized by human eyes. In this case, the hidden data are converted to a string of 1s and 0s. Then these binary values are represented by proportional font with one bit encoding in one character. Low payload capacity is the limitation of this technique, as one character is used to embed one bit of hidden data. The application of frequently used emoticons has been recently introduced as cover media [15]. To achieve this, a pre-shared list is specified to map several emoticons to the alphanumeric characters. For example, :-) refers to character A and :-( to character B, and so on. High capacity is one of the advantages of this technique due to the use of one character to replace with one character of hidden data. The emoticons are not only used in SMS steganography, but also used in chat to hide the data. An example of such approach is presented in [16], whereby emoticons are categorized into several classes based on the feelings expressed by each emoticon such as cry and happy classes. Then in each class, emoticons are ordered and located at different locations to embed end extract the secret message. For instance, to embed the bit string like 1110 which is equivalent to 14 in decimal format, a category is selected which has emoticon at location 14. Thus, emoticon 14 from that particular category is selected and sent to the recipient. To extract the hidden data, the same emoticon categories are used with respect to the location of the sent emoticon which is located in 14 and then the binary value (1110) is extracted. However, in this method, to embed higher values such as 65 ( ), we need to use more than one emoticons (two emoticons) due to limitation on the number of emoticons in each category. Despite the numerous techniques that have been proposed, no work to the best of our knowledge has suggested lingoes as feelings expression, which is generally accepted and used in SMS and chat environment, in order to hide the secret message. The aim of this research is to study on how lingoes in conjunction with the other feelings expression such as emoticons can be used to embed and extract the hidden data in a natural way within the SMS between two parties. The result shows that the current method can embed the secret message within the SMS naturally without raising the attention of eavesdropper. The rest of the paper is organized as follows: Section III describes the proposed method. Section IV draws the discussion and conclusion. III. PROPOSED METHOD The illustration of the proposed method for SMS steganography is depicted in fig 1, which is also utilized similar architecture as those described in [15,16]. In this approach, the emoticons and lingoes (abbreviation of words) that are frequently typed in chat and SMS, are used as cover media to deliver the data in a hidden manner. The recipient is able to decode the data based on the meaning of emoticons and lingoes in the pre-shared list. The encoding is based on one character per emoticon or lingo. Fig. 1. Proposed method The emoticon is a sort of icons that depicts a user s feeling in text mode as shown in fig 2. These icons are widely used, especially in SMS and chat where there is a limitation on the number of characters. Also, abbreviations are also used as lingo to transfer the meaning with less number of characters such as "gr8" for great. 104
3 (160 characters) and cannot be fitted within one SMS, the rest of the secret message can be transferred to the second SMS and so on. Finally, the stego text is passed to the recipient through SMS. Fig. 2. Several SMS emoticons A. Embedding The first step in the proposed technique involves suggesting a pre-shared list that contains lingoes and emoticons along with their alphanumeric meanings, as shown in Table I. This list is commonly shared between the sender and recipient to encode and decode the secret message in the SMS. This pre-shared list is developed as an application in the Android operating system for embedding and extracting purpose. In the next step, the sender needs to embed the secret message within several steps. Figure 3 shows the main windows of the application that contains embedding and extraction parts developed using Java programming language. The user is required to select the embedding function first, since the interest is on in concealing the data. Then, as shown in fig 4, the application requests for the secret message, (for example "attack"), to be transmitted to the recipient. Further, by using Table 1, the secret message characters (attack) can be converted to their respective characters such as " ;) tbh tbh ;) -.- plox " which is shown in fig 5. Therefore, this conversion method is used as a pre-share list (key) which is exchanged through a different channel rather than SMS in order to embed and extract the secret message. In addition, each derived lingo and emoticon can be placed anywhere within the cover text (beginning, middle or at the end of each sentence or even a word) depending on the meaning of the sentence or word preceding or succeeding the lingo or emoticon. Then, the user is required to type a cover text in conjunction with the generated lingoes and emoticons as shown in fig 5. Since the emoticons and lingoes are used for hiding the data which represents human feelings, we would like to emphasize that selection of cover text should be done based on the feelings that are related to the generated lingoes and emoticons. This is important to make the stego text appear as normal as possible to the eavesdropper. For example, ;) is the first generated character which is one of the emoticons, meaning wink. In this case, the sender must pay attention to this, to type a sentence with a non-contradicting feelings to the mentioned emoticon such as angry. Similarly, it will be preferable for the remaining cover text sentences be equivalent to the corresponding generated lingoes and emoticons. In rare cases, if the length of secret message is longer than normal Fig. 3. Main window of SMS steganography application TABLE I. PRE-SHARED LIST Alphanumeric Lingoes and emoticons a ;) b ;( c -.- d =) e =( f :) g :( h =/ i =\ j QAQ K plox l =.= m ToT n == o._. p xd q OTL r afk s brb t tbh u tldr v lmao w wew X ttyl y wp z iirc 1 gg 2 :] 3 :[ 4 ikr 5 rofl 6 >.< 7 asap 8 -_- 9 =] 0 =[ 105
4 Fig. 4. Entering secret message window Fig. 6. Extracting windoww Fig. 5. Embedding window Fig. 7. Extracted secret message B. Extracting Similarly, in the recipient side, the user is required to use the same mobile application to extract the secret message from the SMS. To this end, the mobile application uses the same pre-shared list to extract the secret message from the stego SMS. Since the words are not important in stego SMS, the mobile application searches through entire SMS in order to extract the emoticons and lingoes. Later on, these emoticons and lingoes are represented the secret message characters using Table 1 as shown in fig 6 and 7. For example, the first character, apart from words, is " ;) " which is converted to the character " a ". In the same way, the rest of other emoticons and lingoes of receiving SMS can be converted in the same way using Table 1 to complete the secret message (attack). IV. DISCUSSION AND CONCLUSION This paper suggested a method for hiding data using lingoes and emoticons in SMS. Based on the fact that, mobile phone is now a widely used mode of communication by the larger population, the described method is usable anywhere and at any time, withoutt being conspicuous to an eavesdropper. Hiding data in SMS can be performed using different approaches. Several researchers have used image to hide secret messages [8,11,13]. The main advantage of this method is high capacity due to using pixel intensity to embed the secret message. However, any modification of the image during the transition, such as filtering, can affect on the result. Also, use of word abbreviations and full form have been attempted to represent the secret message in SMS [9,10]. Since the embedding is based on bits, several abbreviated forms of the words are required to transmit the hidden data. In this case, it would raise the attention of the attacker to the existence of secret message in the SMS. Due to SMS being used a mutual communication between sender and receiver, in [12], Sudoku puzzle is used to embed the secret message within locations of puzzle cells. In another approach, human feelings are represented as emoticons in SMS and chat [15,16] to transfer the secret message. Moreover, using only 106
5 emoticons to express users feelings continuously in SMS would generate a pattern to identify the existence of hidden message. However, delivering more data is the principal advantage of this method due to the need of representing one character of secret message with one emoticon in the SMS. However, in this study, lingoes are suggested as additional feelings apart from emoticons to make the cover media becomes more realistic rather than using only word and emoticons. In other words, the stego media (SMS) is a combination of word, emoticons and lingoes which is very similar to its natural form as shown in fig 6. Since lingoes introduce the chance to express more feelings on SMS, a user has more flexibility to select proper sentences to deliver the secret message by his feelings, based on emoticons and lingoes. Although the proposed is quite simplistic, it works quite effectively based on the experiments we have conducted. Nevertheless, we would like to point out the limitations of this work. The first one is that, some lingoes with more than one character such as "plox" occupy several characters of cover media, which results in embedding smaller hidden data due to the limitation of characters per SMS (160 characters). The second is using fixed pre-shared list (key) which can be disclosed or guessed by the attacker in order to extract the secret. In future works, the suggested method can be expanded to dual steganography, which takes encryption into account by encoding (cryptography) secret message before embedding for better security. In addition, the pre-shared list containing the alphanumeric characters can be shuffled from time to time to generate a new private key, to be used between the sender and receiver, during embedding and extraction of hidden data. This creates some difficulties for the eavesdropper to understand the secret message. REFERENCES [1] Digital cellular telecommunications system, Global System for Mobile communications (GSM) ETSI TS , GSM version 7.4.0, [2] Technical realization of the Short Message Service (SMS) ETSI, [3] M. Kashif, " Secure SMS communication using encryption gateway and digital signature ", International Conference on Computational Science and Engineering (CSE), pp , [4] J. Singh, R. Ruhl, and D. Lindskog, " Secure GSM OTA SIM cloning attack and cloning resistance in EAP- SIM and USIM ", International Conference on Social Computing (SocialCom), pp , [5] S. Bhattacharyaa, I. Banerjee, and G. Sanyal, "A survey of steganography and steganalysis technique in image, text, audio and video as cover carrier", Journal of global research in computer science, 2(4), [6] I. V. S. Manjo, "Cryptography and steganography", International journal of computer applications, 1(12), [7] M. Agarwal, "Text steganography approaches: a comparison", International journal of network security and its application, 5(1), [8] M. Shirali-Shahreza, "Stealth steganography in SMS", Proceedings of the third IEEE and IFIP International conference on wireless and optical communications networks (WOCN), April, [9] M. Shirali-Shahreza, and M. H. Shirali-Shahreza, " Text steganography in SMS", International conference on convergence information technology, pp , [10] K. F. Rafat, "Enhanced text steganography in SMS", International conference on computer, control and communication, pp. 1-6, [11] M. H. Shirali-Shahreza, and M. Shirali-Shahreza, "Sending mobile software activation code by SMS using steganography", Third international conference on intelligent information hiding and multimedia signal processing, 1, pp , [12] M. H. Shirali-Shahreza, and M. Shirali-Shahreza, "Steganography in SMS by Sudoku puzzle", International conference on computer systems and applications, pp , [13] M. Shirali-Shahreza, "Improving mobile banking security using steganography", Fourth international conference on information technology, pp , [14] W. S. Bhaya, "Text hiding in mobile phone simple message service using fonts", Journal of computer science,7 (11), pp , [15] W. S. Bhaya, "A new approach to SMS text steganography using emoticons", International journal of computer applications, [16] W. Zhi-Hui, C. Chin-Chen, D. K. The, and L. Ming-Chu, "Emoticonbased text steganography in chat", Asia-Pacific conference computational intelligence and industrial applications, 2, pp ,
A New Approach to SMS Steganography using Mathematical Equations
A New Approach to SMS Steganography using Mathematical Equations Min Yang Lee, Vahab Iranmanesh *, Juan C. Quiroz Faculty of Science and Technology Sunway University Bandar Sunway, Malaysia 12050431@imail.sunway.edu.my,
More informationUse of Visual Cryptography and Neural Networks to Enhance Security in Image Steganography
Use of Visual Cryptography and Neural Networks to Enhance Security in Image Steganography K.S.Seethalakshmi (Department of Computer Science and Engineering, RVCE / VTU, INDIA) ABSTRACT : As a result of
More informationEfficient & Secure Data Hiding Using Secret Reference Matrix
Efficient & Secure Data Hiding Using Secret Reference Matrix Laxman Tawade 1, Rajshree Mahajan 2, Chandan Kulthe 3 1 Department of Electronic and Telecommunication Engineering, Pune University, India 2,3
More informationDIGITAL STEGANOGRAPHY 1 DIGITAL STEGANOGRAPHY
DIGITAL STEGANOGRAPHY 1 DIGITAL STEGANOGRAPHY DIGITAL STEGANOGRAPHY 2 Abstract Steganography derives from a Greek word and means covered writing. It is a sector of computer information security. Cryptography
More informationSteganography using MATLAB
ABHIYANTRIKI Steganography using MATLAB An International Journal of Engineering & Technology (A Peer Reviewed & Indexed Journal) Vol. 3, No. 5 (May, 2016) http://www.aijet.in/ eissn: 2394-627X Srikant
More informationBit Adjusting Image Steganography in Blue Channel using AES and Secured Hash Function
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 6.017 IJCSMC,
More informationVARIABLE RATE STEGANOGRAPHY IN DIGITAL IMAGES USING TWO, THREE AND FOUR NEIGHBOR PIXELS
VARIABLE RATE STEGANOGRAPHY IN DIGITAL IMAGES USING TWO, THREE AND FOUR NEIGHBOR PIXELS Anita Pradhan Department of CSE, Sri Sivani College of Engineering, Srikakulam, Andhra Pradesh, India anita.pradhan15@gmail.com
More informationA Data Hiding Model for Image Steganography Using Primes: Towards Data Security
International Journal of Computational Engineering & Management, Vol. 15 Issue 3, May 2012 www..org 1 A Data Hiding Model for Image Steganography Using Primes: Towards Data Security Mamatha.T Assistant
More informationDigital Image Steganography Techniques: Case Study. Karnataka, India.
ISSN: 2320 8791 (Impact Factor: 1.479) Digital Image Steganography Techniques: Case Study Santosh Kumar.S 1, Archana.M 2 1 Department of Electronicsand Communication Engineering, Sri Venkateshwara College
More informationLSB Based Audio Steganography Using Pattern Matching
ISSN: 359-0040 Vol 2 Issue, November - 205 LSB Based Audio Steganography Using Pattern Matching Mr Ratul Choudhury Student, Dept of Computer Sc & Engg Dept University of Calcutta Kolkata, India ratulchowdhury@iemcalcom
More informationA Review of Approaches for Steganography
International Journal of Computer Science and Engineering Open Access Review Paper Volume-2, Issue-5 E-ISSN: 2347-2693 A Review of Approaches for Steganography Komal Arora 1* and Geetanjali Gandhi 2 1*,2
More informationA Performance of Embedding Process for Text Steganography Method
A Performance of Embedding Process for Text Steganography Method BAHARUDIN OSMAN 1, ROSHIDI DIN 1, TUAN ZALIZAM TUAN MUDA 2, MOHD. NIZAM OMAR 1, School of Computing 1, School of Multimedia Technology and
More informationHiding of Random Permutated Encrypted Text using LSB Steganography with Random Pixels Generator
Hiding of Random Permutated Encrypted Text using LSB Steganography with Random Pixels Generator Noor Kareem Jumaa Department of Computer Technology Engineering Al-Mansour University College, Iraq ABSTRACT
More informationAN OPTIMIZED TEXT STEGANOGRAPHY APPROACH USING DIFFERENTLY SPELT ENGLISH WORDS
Volume 118 No. 16 2018, 653-666 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu AN OPTIMIZED TEXT STEGANOGRAPHY APPROACH USING DIFFERENTLY SPELT ENGLISH
More informationSTEGANOGRAPHY USING 2LSB PARITY CHECK AND BPCS TECHNIQUES
STEGANOGRAPHY USING 2LSB PARITY CHECK AND BPCS TECHNIQUES Prof. Dipti Dighe 1, Swati Dubey 2, Prof. Shubhangi Takawane 3 1,2,3 Electronics and telecommunication Engineering Department, G.S. Moze College
More informationA Revisit to LSB Substitution Based Data Hiding for Embedding More Information
A Revisit to LSB Substitution Based Data Hiding for Embedding More Information Yanjun Liu 1,, Chin-Chen Chang 1, and Tzu-Yi Chien 2 1 Department of Information Engineering and Computer Science, Feng Chia
More informationSteganalysis of Hydan
Steganalysis of Hydan Jorge Blasco 1, Julio C. Hernandez-Castro 1, Juan M.E. Tapiador 1 Arturo Ribagorda 1 and Miguel A. Orellana-Quiros 2 1 {jbalis, jcesar, jestevez, arturo}@inf.uc3m.es 2 mangel.orellana@meh.es
More informationImage Steganography Technique By Using Braille Method of Blind People (LSBraille)
Image Steganography Technique By Using Braille Method of Blind People (LSBraille) Abdelmgeid Amin Ali Associate Professor, Dept. of Computer Science Faculty of Science, Al Minia University Al Minia, Egypt
More information[2014] Steganography Using Prime Technique. Vinam Tomar. Kamal Saluja. Authors. Guided By-
Steganography Using Prime Technique Authors Vinam Tomar Guided By- Kamal Saluja Ganga Technical Campus, Soldha Email-vinamtomar@gmail.com Abstract Steganography is the art and science of communicating
More informationA Novel Approach for Hiding Encrypted Data in Image, Audio and Video using Steganography
A Novel Approach for Hiding Encrypted Data in Image, Audio and Video using Steganography V. Lokeswara Reddy Associate Professor, Department of CSE, K.S.R.M. College of Engg., Kadapa, Y.S.R. Dist., A.P.(INDIA)
More informationAN IMAGE STEGANOGRAPHY ALGORITHM BASED ON LOGICAL CONNECTIVE
AN IMAGE STEGANOGRAPHY ALGORITHM BASED ON LOGICAL CONNECTIVE 1 SITI DHALILA MOHD SATAR, 1 NAZIRAH ABD HAMID, 1 FATIMAH GHAZALI, 1 ROSLINDA MUDA, 1 MOHAMAD AFENDEE MOHAMED 1 Faculty of Informatics and Computing,
More informationFast Real-Time Hardware Engine for Multipoint Text Steganography
Fast Real-Time Hardware Engine for Multipoint Text Steganography Ammar Odeh, Khaled Elleithy, and Miad Faezipour Dept. of Computer Science and Engineering University Of Bridgeport Bridgeport, CT 06604,
More informationNovel Content Independent Steganographic Method for Microsoft Office
Vol. 9/ No. 2 (2017) INTERNETWORKING INDONESIA JOURNAL 17 Novel Content Independent Steganographic Method for Microsoft Office Saqib Ishtiaq, Aihab Khan and Basheer Ahmad Samim Abstract Microsoft Office
More informationCREATING AN IMAGE USING ENCRYPTED SENSITIVE WORDS
CREATING AN IMAGE USING ENCRYPTED SENSITIVE WORDS Reshmi.R.V Student, Dept. of Information Technology, CSI College Of Engineering, India ABSTRACT--Data hiding is one of the most better data and communication
More informationMULTILAYER DATA HIDING USING SLS COMBINED WITH LSB TECHNIQUE FOR IMAGE CRYPTO- STEGANOGRAPHY
MULTILAYER DATA HIDING USING SLS COMBINED WITH LSB TECHNIQUE FOR IMAGE CRYPTO- STEGANOGRAPHY Mr. Abhale Babasaheb A 1, Ms. Jyoti Bhagwat 2, Ms. Priyanka Dopare 3 1,2,3 SND COE & RC,Savitribai Phule Pune
More informationArchitectural Design of Multi Level Steganography System for Data Transmission
Architectural Design of Multi Level Steganography System for Data Transmission Adedayo Adeolu Adeniji, Micheal Esiefarienrhe, and Naison Gasale Abstract Recent advances in steganography systems have shown
More informationChaos-based Modified EzStego Algorithm for Improving Security of Message Hiding in GIF Image
015 International Conference on Computer, Control, Informatics and Its Applications Chaos-based Modified EzStego Algorithm for Improving Security of Message Hiding in GIF Image Rinaldi Munir Informatics
More informationKeywords Stegnography, stego-image, Diamond Encoding, DCT,stego-frame and stego video. BLOCK DIAGRAM
Volume 6, Issue 1, January 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Information
More informationMeaningful Shadows for Image Secret Sharing with Steganography and Authentication Techniques
Journal of Information Hiding and Multimedia Signal Processing 2014 ISSN 2073-4212 Ubiquitous International Volume 5, Number 3, July 2014 Meaningful Shadows for Image Secret Sharing with Steganography
More informationA Hybrid Method of Hiding The Text Information Using Stegnography
A Hybrid Method of Hiding The Text Information Using Stegnography M.Grace Vennice, M.Swapna, MD.Ahmad Ali & T.Dharma Reddy CSE Dept, CMRCET, Hyderabad, India. E-mail : grace_vennice@yahoo.co.in, swapna_manthena2007@yahoo.com
More informationSTEGANOGRAPHY: THE ART OF COVERT COMMUNICATION
Journal homepage: www.mjret.in STEGANOGRAPHY: THE ART OF COVERT COMMUNICATION Sudhanshi Sharma 1, Umesh Kumar 2 Computer Engineering, Govt. Mahila Engineering College, Ajmer, India 1 sudhanshisharma91@gmail.com,
More informationSteganalysis of Hydan
Steganalysis of Hydan Jorge Blasco, Julio C. Hernandez-Castro, Juan M.E. Tapiador, Arturo Ribagorda and Miguel A. Orellana-Quiros Abstract Hydan is a steganographic tool which can be used to hide any kind
More informationRandom Image Embedded in Videos using LSB Insertion Algorithm
Random Image Embedded in Videos using LSB Insertion Algorithm K.Parvathi Divya 1, K.Mahesh 2 Research Scholar 1, * Associate Professor 2 Department of Computer Science and Engg, Alagappa university, Karaikudi.
More informationAdaptive Pixel Pair Matching Technique for Data Embedding
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 1, January 2014,
More informationROBUST VIDEO DATA HIDING USING FORBIDDEN ZONE DATA HIDING AND SELECTIVE EMBEDDING
ROBUST VIDEO DATA HIDING USING FORBIDDEN ZONE DATA HIDING AND SELECTIVE EMBEDDING ABSTRACT: Video data hiding is still an important research topic due to the design complexities involved. We propose a
More informationData Hiding on Text Using Big-5 Code
Data Hiding on Text Using Big-5 Code Jun-Chou Chuang 1 and Yu-Chen Hu 2 1 Department of Computer Science and Communication Engineering Providence University 200 Chung-Chi Rd., Shalu, Taichung 43301, Republic
More informationChallenges of Hidden Data in the Unused Area Two within Executable Files
Journal of Computer Science 5 (11): 890-897, 2009 ISSN 1549-3636 2009 Science Publications Challenges of Hidden Data in the Unused Area Two within Executable Files A.W. Naji, A.A. Zaidan and B.B. Zaidan
More informationSTEGANOGRAPHIC SECURE DATA COMMUNICATION USING ZIGBEE
STEGANOGRAPHIC SECURE DATA COMMUNICATION USING ZIGBEE MR.NITIN B.NAIK, MRS.ARCHANA NITIN NAIK Vice-Principal, Sharad Institute of Technology,Polytechnic, Yadrav,Dist.Kolhapur(Maharashtra),India HOD E&TC,
More informationPixel Steganalysis A Novel Approach in Image Steganography Using F5 Algorithm
Pixel Steganalysis A Novel Approach in Image Steganography Using F5 Algorithm Prabhu Kumar 1,, Nikhil Tirpathi, 2, G.Michael 3 UG Student, Dept. of CSE, Bharath University, Chennai, India 1,2 Assistant
More informationPAYLOAD CAPACITY ENHANCEMENT IN THE FIELD OF STEGANOGRAPHY BY USING MOBILE APPLICATION BASED STEGO TECHNIQUE
PAYLOAD CAPACITY ENHANCEMENT IN THE FIELD OF STEGANOGRAPHY BY USING MOBILE APPLICATION BASED STEGO TECHNIQUE By CHANDRAKANT BADGAIYAN Assistant Professor, Department of Mechatronics Engineering, C.S.I.T.
More informationRobust Steganography Using Texture Synthesis
Robust Steganography Using Texture Synthesis Zhenxing Qian 1, Hang Zhou 2, Weiming Zhang 2, Xinpeng Zhang 1 1. School of Communication and Information Engineering, Shanghai University, Shanghai, 200444,
More informationOTP-Steg. One-Time Pad Image Steganography Using OTP-Steg V.1.0 Software October 2015 Dr. Michael J. Pelosi
OTP-Steg One-Time Pad Image Steganography Using OTP-Steg V.1.0 Software October 2015 Dr. Michael J. Pelosi What is Steganography? Steganography literally means covered writing Encompasses methods of transmitting
More informationINTERNATIONAL JOURNAL FOR ADVANCE RESEARCH IN ENGINEERING AND TECHNOLOGY WINGS TO YOUR THOUGHTS..
Strong Encryption Key with Enhanced Security of image Steganography by Modulus operator Method TARUN DHAR DIWAN 1, SOMYA YASH 2 1 Dr.C.V.RAMAN UNIVERSITY, BILASPUR, INDIA ASSISTANT PROFESSOR DEPTT.OF ENGINEERING
More informationRandom Traversing Based Reversible Data Hiding Technique Using PE and LSB
Random Traversing Based Reversible Data Hiding Technique Using PE and LSB Rhythm Katira #1, Prof. V. Thanikaiselvan *2 # ECE Department, VIT University Vellore, Tamil-Nadu, India 1 rhythm.katira2009@vit.ac.in
More informationHTML Steganography using Relative links & Multi web-page Embedment
HTML Steganography using Relative links & Multi web-page Embedment 1 Chintan Dhanani, 2 Krunal Panchal 1 Mtech Scholar, 2 Lecturer Department of computer engineering, Gujarat Technological University,
More informationNathanaël COTTIN 14/05/2010 Hide secret information within innocuous carriers
Nathanaël COTTIN 14/05/2010 Hide secret information within innocuous carriers Introduction to steganography org.steganography library principles Hide & Reveal screenshots 14/05/2010 Steganography made
More informationA Detailed look of Audio Steganography Techniques using LSB and Genetic Algorithm Approach
www.ijcsi.org 402 A Detailed look of Audio Steganography Techniques using LSB and Genetic Algorithm Approach Gunjan Nehru 1, Puja Dhar 2 1 Department of Information Technology, IEC-Group of Institutions
More informationSecret Sharing in Audio Steganography
Secret Sharing in Audio Steganography Ka Fai Peter Chan Defence, Peace, Safety & Security (DPSS) Council for Scientific and Industrial Research Pretoria, South Africa kchan@csir.co.za Abstract This paper
More informationCHAPTER 6. LSB based data hiding with double Encryption. 6.1 Introduction
CHAPTER 6 LSB based data hiding with double Encryption 6.1 Introduction In image steganography, the amount of secret data that can be embedded depends on the method and the cover-image as capacity limitation
More informationAnalysis of Steganography as a Security Technique
Analysis of Steganography as a Security Technique Anirudh Sohil Department of Information Technology BVCOE, New Delhi Abstract: Application developers faces many challenges while creating an application
More informationSECURE DATA EMBEDDING USING REVERSIBLE DATA HIDING FOR ENCRYPTED IMAGES
VOL., NO. 7, APRIL 5 ISSN 89-668 6-5 Asian Research Publishing Network (ARPN). All rights reserved. SECURE DATA EMBEDDING USING REVERSIBLE DATA HIDING FOR ENCRYPTED IMAGES R. Selveeswari and P. R. Vijayalakshmi
More informationImplementing Security in QR Codes by using Blowfish Algorithm
Implementing Security in QR Codes by using Blowfish Algorithm Harpreet Sandhu 2, Kamesh Dubey 2 1 (Dept of Computer Science, CT Institute of Technology & Research, Jalandhar, Punjab, India) 2 (Dept of
More informationNew Technique for Encoding the Secret Message to Enhance the Performance of MSLDIP Image Steganography Method (MPK Encoding)
New Technique for Encoding the Secret to Enhance the Performance of Image Steganography Method (MPK Encoding) Abdelmgeid Amin Ali Associate Professor, Dept. of Computer Science Faculty of Science, Al -
More informationPerformance Evaluation of LSB based Steganography for optimization of PSNR and MSE
Performance Evaluation of LSB based Steganography for optimization of PSNR and MSE 1 Naitik P Kamdar, 2 Dipesh G. Kamdar 3 Dharmesh N.khandhar. 1 (Student of Master of Engineering in Electronics & Communication,
More informationSmart Data Encryption And Transfer : Steganographic tool for hiding data A JAVA based open source application program
Smart Data Encryption And Transfer : Steganographic tool for hiding data A JAVA based open source application program K. Jayamalini 1, Shashank Dubey 2, Ashish Singh 3, Geetesh Tiwari 4, Gaurav Singh 5
More informationII. LITERATURE SURVEY
Secure Transaction By Using Wireless Password with Shuffling Keypad Shweta Jamkavale 1, Ashwini Kute 2, Rupali Pawar 3, Komal Jamkavale 4,Prashant Jawalkar 5 UG students 1,2,3,4, Guide 5, Department Of
More informationDistributed Steganography
Distributed Steganography Background Steganography refers to any methodology used to hide a message (including text, sound, or picture) in a separate file. Most commonly text or an image is inserted into
More informationHybrid Stegnography using ImagesVaried PVD+ LSB Detection Program
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 4 Issue 5 May 2015, Page No. 12086-12090 Hybrid Stegnography using ImagesVaried PVD+ LSB Detection Program Shruti
More informationA reversible data hiding based on adaptive prediction technique and histogram shifting
A reversible data hiding based on adaptive prediction technique and histogram shifting Rui Liu, Rongrong Ni, Yao Zhao Institute of Information Science Beijing Jiaotong University E-mail: rrni@bjtu.edu.cn
More informationA Stegnographic Method For Secure Communication And Access Control Using Web Service Container
International Journal Of Scientific Research And Education Volume 2 Issue 11 Pages-2191-2197 November-2014 ISSN (e): 2321-7545 Website: http://ijsae.in A Stegnographic Method For Secure Communication And
More informationA Novel Model for Encryption of Telugu Text Using Visual Cryptography Scheme
A Novel Model for Encryption of Telugu Text Using Visual Cryptography Scheme G. Lakshmeeswari *, D. Rajya Lakshmi, Y. Srinivas, and G. Hima Bindu GIT, GITAM University, Visakhapatnam, Andhra Pradesh {lak_pr,rdavuluri}@yahoo.com,
More informationComputers and Security
The contents of this Supporting Material document have been prepared from the Eight units of study texts for the course M150: Date, Computing and Information, produced by The Open University, UK. Copyright
More informationText Steganography Using Compression and Random Number Generators
Text Steganography Using Compression and Random Number Generators Mohamed Y Elmahi Elimam Almahdi University Kosti, Sudan Talaat M.wahbi Sudan University of Science and Technology Khartoum, Sudan Mohamed
More informationJeff Hinson CS525, Spring 2010
DIGITAL WATERMARKING Jeff Hinson CS525, Spring 2010 Outline Introduction Challenges Algorithms / Methods Detection Existing Programs Lessons Learned / Conclusion Questions Jeff Hinson CS525 Slide #1 Introduction
More informationA New Approach to Authenticate Images in Different Datasets Using a Lossless Image Watermarking Technique
A New Approach to Authenticate Images in Different Datasets Using a Lossless Image Watermarking Technique 1 Arathi Chitla, 2 Dr. M. Chandra Mohan 1 Associate Professor, Department of Computer Science &
More informationA Reversible Data Hiding Scheme for BTC- Compressed Images
IJACSA International Journal of Advanced Computer Science and Applications, A Reversible Data Hiding Scheme for BTC- Compressed Images Ching-Chiuan Lin Shih-Chieh Chen Department of Multimedia and Game
More informationEFFICIENT METHOD FOR HIDING DATA BY PIXEL INTENSITY
EFFICIENT METHOD FOR HIDING DATA BY PIXEL INTENSITY M.Shobana # 1, R.Manikandan *2 #1 Department School of Computing, SASTRA University, Thanjavur,TamilNadu, India. *2 Senior Asst Prof, School of Computing,
More informationResearch Article A Novel Steganalytic Algorithm based on III Level DWT with Energy as Feature
Research Journal of Applied Sciences, Engineering and Technology 7(19): 4100-4105, 2014 DOI:10.19026/rjaset.7.773 ISSN: 2040-7459; e-issn: 2040-7467 2014 Maxwell Scientific Publication Corp. Submitted:
More informationA BTC-COMPRESSED DOMAIN INFORMATION HIDING METHOD BASED ON HISTOGRAM MODIFICATION AND VISUAL CRYPTOGRAPHY. Hang-Yu Fan and Zhe-Ming Lu
International Journal of Innovative Computing, Information and Control ICIC International c 2016 ISSN 1349-4198 Volume 12, Number 2, April 2016 pp. 395 405 A BTC-COMPRESSED DOMAIN INFORMATION HIDING METHOD
More informationAppendix A. Definition of Terms
Appendix A Definition of Terms Artifact: Artifacts are the irregularities that may be present in an image after processing. They are not related to the details of the image and sometimes accompany transmitted
More informationPROTECTION OF PASSWORD USING TEXT STEGANOGRAPHY AND THRESHOLD SECRET SHARING SCHEME
Volume 118 No. 18 2018, 2127-2132 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu PROTECTION OF PASSWORD USING TEXT STEGANOGRAPHY AND THRESHOLD SECRET
More informationIMPROVED ALGORITHM FOR VISUAL CRYPTOGRAPHY USING REGION INCREMENTATION
Int. J. Engg. Res. & Sci. & Tech. 24 Priyanka Agrawal and Vijay Kumar Sharma, 24 Research Paper ISSN 239-599 www.ijerst.com Vol. 3, No. 4, November 24 24 IJERST. All Rights Reserved IMPROVED ALGORITHM
More informationDWT-SVD Based Hybrid Approach for Digital Watermarking Using Fusion Method
DWT-SVD Based Hybrid Approach for Digital Watermarking Using Fusion Method Sonal Varshney M.tech Scholar Galgotias University Abhinandan Singh M.tech Scholar Galgotias University Abstract With the rapid
More informationSECURITY SYSTEM FOR DATA USING STEGANOGRAPHY AND CRYPTOGRAPHY (SSDSC)
SECURITY SYSTEM FOR DATA USING STEGANOGRAPHY AND CRYPTOGRAPHY (SSDSC) Ayman Wazwaz 1, Khalil Abu-haltam 2, Sawan Atawneh 2, Areej Idaes 2, Dalal Salem 2 1 Electrical Engineering Department, Palestine Polytechnic
More informationAudio Contents Protection using Invisible Frequency Band Hiding Based on Mel Feature Space Detection: A Review
Journal Science ISSN: 39-7157, ISSN: 39-7157, 1 015 015 Audio Contents Protection using Invisible Frequency Band Hiding Based on Mel Feature Space Detection: A Review Shefali Rani1, Yogesh Kumar 1 (M.Tech
More informationA New Approach to Compressed Image Steganography Using Wavelet Transform
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 5, Ver. III (Sep. Oct. 2015), PP 53-59 www.iosrjournals.org A New Approach to Compressed Image Steganography
More informationOverview Of Techniques Of Stegnography On Various Media
Overview Of Techniques Of Stegnography On Various Media Ms. Arpana Chaturvedi,, Jagannath International Management School, Vasant Kunj, Email: pcord.bca@jagannath.org Ms.Poonam Verma, Jagannath International
More informationNature Sunday Academy Lesson Plan
Title Computer Security Description: Nature Sunday Academy Lesson Plan 2013-14 The objective of the lesson plan aims to help students to understand the general goals of security, the essential concerns
More informationHighly Secure Invertible Data Embedding Scheme Using Histogram Shifting Method
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue 8 August, 2014 Page No. 7932-7937 Highly Secure Invertible Data Embedding Scheme Using Histogram Shifting
More informationText Hiding In Multimedia By Huffman Encoding Algorithm Using Steganography
Text Hiding In Multimedia By Huffman Encoding Algorithm Using Steganography Madhavi V.Kale 1, Prof. Swati A.Patil 2 PG Student, Dept. Of CSE., G.H.Raisoni Institute Of Engineering And Management,Jalgaon
More informationSudipta Sahana Asst. Professor, Dept. of CSE JIS College of Engineering Kalyani, West Bengal, India
Volume 4, Issue 10, October 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Dynamic Size
More informationProtocol Data Hiding. By Chet Hosmer Article Posted: March 06, 2012
Protocol Data Hiding By Chet Hosmer Article Posted: March 06, 2012 On Cinco de Mayo in 1997, which happened to be the first Monday in May that year, the Hacker Publication First Monday included an article
More informationA Novel Approach to Format Based Text Steganography
A Novel Approach to Format Based Text Steganography Sangita Roy School of Computer Engineering KIIT University Bhubaneswar, India rubyroy21.2005@gmail.com Manini Manasmita School of Computer Engineering
More informationData Hiding in Binary Text Documents 1. Q. Mei, E. K. Wong, and N. Memon
Data Hiding in Binary Text Documents 1 Q. Mei, E. K. Wong, and N. Memon Department of Computer and Information Science Polytechnic University 5 Metrotech Center, Brooklyn, NY 11201 ABSTRACT With the proliferation
More informationDigital Image Steganography Using Bit Flipping
BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 18, No 1 Sofia 2018 Print ISSN: 1311-9702; Online ISSN: 1314-4081 DOI: 10.2478/cait-2018-0006 Digital Image Steganography Using
More informationNew Steganography Technique with Symmetric Cryptography
17 New Steganography Technique with Symmetric Cryptography Swati Gupta, PG Student, Department of CSE, SSSITS, Sehore, India Gajendra Singh, Head, Department of CSE &IT, SSSITS, Sehore, India Ravindra
More informationA NEW WATERMARKING TECHNIQUE FOR SECURE DATABASE
Online Journal, www.ijcea.com A NEW WATERMARKING TECHNIQUE FOR SECURE DATABASE Jun Ziang Pinn 1 and A. Fr. Zung 2 1,2 P. S. University for Technology, Harbin 150001, P. R. China ABSTRACT Digital multimedia
More informationText Steganography in SMS Using Similarity of Glyphs in Unicode Characters
Indian Journal of Science and Technology, Vol 8(29), DOI: 10.17485/ijst/2015/v8i29/84227, November 2015 ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 Text Steganography in SMS Using Similarity of
More informationWLAN Security Overview
WLAN Security Overview This Chapter Explore the basic terminology of WLAN security. Discuss the organizations that create the standards, certifications, and recommendations that help guide and direct wireless
More informationA New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam Patel 3 Rakesh Patel 4
IJSRD - International Journal for Scientific Research & Development Vol. 2, Issue 08, 2014 ISSN (online): 2321-0613 A New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam
More informationInformation and Communications Security: Encryption and Information Hiding
Short Course on Information and Communications Security: Encryption and Information Hiding Tuesday, 10 March Friday, 13 March, 2015 Lecture 10: Information Hiding Contents Covert Encryption Principles
More informationTable of Contents. Starting a Thread. Replying to a Post. Searching for new threads/discussions and Posts. Reporting a Post
Table of Contents Starting a Thread Replying to a Post Searching for new threads/discussions and Posts Reporting a Post Uploading Media Files Like You Tube Uploading a Picture to a Post Quoting a Post
More informationInformation Cloaking Technique with Tree Based Similarity
Information Cloaking Technique with Tree Based Similarity C.Bharathipriya [1], K.Lakshminarayanan [2] 1 Final Year, Computer Science and Engineering, Mailam Engineering College, 2 Assistant Professor,
More informationCS 595: Cryptography Final Project
CS 595: Cryptography Final Project Tim Wylie December 7, 2009 Project Overview I have implemented a basic covert multi-party communication instant messaging program. The users can communicate with any
More informationConcealing Information in Images using Progressive Recovery
Concealing Information in Images using Progressive Recovery Pooja R 1, Neha S Prasad 2, Nithya S Jois 3, Sahithya KS 4, Bhagyashri R H 5 1,2,3,4 UG Student, Department Of Computer Science and Engineering,
More informationIntroducing Image Steganography in Bangla Language Communication
Introducing Image Steganography in Bangla Language Communication Sams Jarin Lecturer Department of CSE World University Bangladesh, Dhaka, Bangladesh Shah Mohazzem Hossain Captain, Bangladesh Army Instructor,
More informationDATA HIDING IN PDF FILES AND APPLICATIONS BY IMPERCEIVABLE MODIFICATIONS OF PDF OBJECT PARAMETERS
DATA HIDING IN PDF FILES AND APPLICATIONS BY IMPERCEIVABLE MODIFICATIONS OF PDF OBJECT PARAMETERS 1 Jiun-Tsung Wang ( 王竣聰 ) and 2 Wen-Hsiang Tsai ( 蔡文祥 ) 1 Institute of Multimedia Eng., National Chiao
More informationQR Code Watermarking Algorithm based on Wavelet Transform
2013 13th International Symposium on Communications and Information Technologies (ISCIT) QR Code Watermarking Algorithm based on Wavelet Transform Jantana Panyavaraporn 1, Paramate Horkaew 2, Wannaree
More informationCS1114 Assignment 5 Part 1
CS1114 Assignment 5 Part 1 out: Friday, March 30, 2012. due: Friday, April 6, 2012, 9PM. This assignment covers two topics: upscaling pixel art and steganography. This document is organized into those
More informationA secure steganographic algorithm based on Cellular Automata using Fibonacci representation
A secure steganographic algorithm based on Cellular Automata using Fibonacci representation Tuan Duc Nguyen Department of Computer Science Faculty of Science, Khon Kaen University Khon Kaen, Thailand nguyenductuan1982@gmail.com
More information