Browse > Article
http://dx.doi.org/10.7472/jksii.2021.22.6.151

A Study on Novel Steganography Communication Technique based on Thumbnail Images in SNS Messenger Environment  

Yuk, Simun (Department of Defense Science (Computer Engineering), Graduate School of Defense Management, Korean National Defense University)
Cho, Youngho (Department of Defense Science (Computer Engineering), Graduate School of Defense Management, Korean National Defense University)
Publication Information
Journal of Internet Computing and Services / v.22, no.6, 2021 , pp. 151-162 More about this Journal
Abstract
Steganography is an advanced technique that hides secret messages by transforming them into subtle noise and spreading them within multimedia files such as images, video and audio. This technology has been exploited in a variety of espionage and cyber attacks. SNS messenger is an attractive SNS Service platform for sending and receiving multimedia files, which is the main medium of steganography. In this study, we proposed two noble steganography communication techniques that guarantee the complete reception rate through the use of thumbnail images in the SNS messenger environment. In addition, the feasibility was verified through implementation and testing of the proposed techniques in a real environment using KakaoTalk, a representative SNS messenger in south korea. By proposing new steganography methods in this study, we re-evaluate the risk of the steganography methods and promoted follow-up studies on the corresponding defense techniques.
Keywords
Steganography; Defense Information Technology; SNS Messenger; Covert communication; KakaoTalk; Thumbnail image;
Citations & Related Records
연도 인용수 순위
  • Reference
1 "Photo/video file storage period and recovery method after the period has elapsed", KakaoTalk CS. https://cs.kakao.com/helps?articleId=1073197935&service=8&category=645&device=2405&locale=ko
2 "North Korean directives and pledges of allegiance were found on USBs of a party that was carrying out activities against South Korea's introduction of the F-35", Chosun daily, 6 Aug 2021. https://n.news.naver.com/article/023/0003631940?cds=news_edit
3 "Why do North Korean spies use steganography technology?", JoongAng daily, 8 Aug 2021. https://www.joongang.co.kr/article/24126193
4 S. Yuk, J. Park and Y. Cho. "Cyber Threat Analysis of Image Steganography-based Attacks and Defense Approach in National Defense Area," Journal of Defense and Security, vol.1, no.1, pp. 155-182, 2019. https://www.dssc.mil.kr/dssckr/174/subview.do
5 and KARI were also hacked by North Korea. Was information about the KF-21 leaked?", Chosunilbo, 1 Jul 2021. https://www.chosun.com/politics/politics_general/2021/07/01/J23DHZSGR5ABBBR4C3NVPSQIMY/
6 Morkel, Tayana, Jan HP Eloff, and Martin S. Olivier, "An overview of image steganography," ISSA, vol. 1, no. 2, 2005. https://www.academia.edu/2943481/An_overview_of_image_steganography?from=cover_page
7 "84 reports and directives to North Korea were found", Chosun daily, 7 Aug 2021. https://n.news.naver.com/article/023/0003632233?cds=news_edit
8 "Due to North Korea's hacking, President Moon's movement related to the KF-21 release ceremony and data related to electronic warfare equipment have been leaked.", Munhwa daily. 2 Jul 202. http://www.munhwa.com/news/view.html?no=20210702MW084831892300
9 J. Lee, at al. "Military application of steganographic techniques to ensure secure and confidential communication," Battle Development, vol.155, pp. 175-190, 2018.
10 W. Bender et al, "Techniques for data hiding," IBM systems journal, vol. 35, no. 3.4, pp. 313-336, 1996. http://dx.doi.org/10.1147/sj.353.0313   DOI
11 J. Jeon and Y. Cho, "Construction and performance analysis of image steganography-based botnet in KakaoTalk openchat," Computers 8.3, 61, 2019. https://doi.org/10.3390/computers8030061   DOI
12 M. Kwak and Y. Cho, "A novel video steganography-based botnet communication model in telegram sns messenger," Symmetry 13.1, 84, 2021 https://doi.org/10.3390/sym13010084   DOI
13 J. Park and Y. Cho, "Design and implementation of automated steganography image-detection system for the kakaotalk instant messenger," Computers 9.4, 103, 2021. https://doi.org/10.3390/computers9040103   DOI
14 S. Yuk and Y. Cho, "A Study on Steganography-based Botnet C&C Covert Communication Model using Thumbnail Images in SNS Instant Messengers," Proceedings of the KSII Spring Conference, Vol.21.1, pp.197-198, 2020.
15 "Steg," http://www.fabionet.org/node/237
16 "What is OpenCV's INTER_AREA Actually Doing?", WenruDong, 25 jun 2018. https://medium.com/@wenrudong/what-is-opencvs-inter-area-actually-doing-282a626a09b3
17 Shishir Nagaraja et al, "Stegobot: a covert social network botnet," International Workshop on Information Hiding, Springer, Berlin, Heidelberg, pp. 299-313, 2011. https://doi.org/10.1007/978-3-642-24178-9_21   DOI
18 "The North Korean Cultural Exchange Bureau, which had issued orders to four members of the Cheongju party, was also involved in the Ilsimhoe and Wangjaesan incidents" JoongAng daily, 9 Aug 2021. http://naver.me/x2PGuQUS
19 Seoul Central District Court Judgment case 2011gohap1131, 2011gohap1143(merged), 2011gohap1144 (merged), 2011gohap1145(merged), 2011gohap1146(merged)
20 Seoul Central District Court Judgment case 2016 gohap538, 558(merged)
21 Neil F. Johnson and Sushil Jajodia, "Exploring steganography: Seeing the unseen," Computer 31.2, pp. 26-34. 1998. http://dx.doi.org/10.1109/MC.1998.4655281   DOI
22 Seoul High Court Judgment case 2012no805
23 Seoul High Court Judgment case 2014no762
24 Supreme Court of Korea Judgment case 2017do9747
25 "Numerous North Korean directives found on a quadruple sealed USB", Kukmin Daily, 6 Aug 2021. https://n.news.naver.com/article/005/0001462690
26 2020 Sursey on the internet usage, Ministry of Science and ICT of Korea, 2021. https://www.nia.or.kr/site/nia_kor/ex/bbs/List.do?cbIdx=99870
27 "U.S. Department of Justice indicts three North Korean hackers... Suspicion of hacking 1.4 trillion won", Newsis, 18 Feb 2021. https://newsis.com/view/?id=NISX20210218_0001342906&cID=10101&pID=10100
28 "The design drawings of the 'KF-21' were leaked due to two hacks that occurred in KAI." Dong-A daily. 2 Jul 2021. https://www.donga.com/news/article/all/20210701/107728238/1
29 S. Yuk and Y. Cho, "A Study of Stego Botnet Communication Method to Avoid Destruction of Secret Message by Image Down-scaling in KakaoTalk," Korea Computer Congress 2021, pp.1140-1142, 2021. http://www.dbpia.co.kr/journal/articleDetail?nodeId=NODE10583196
30 S. Gollapudi, "Learning computer vision using OpenCV," A press, Springer, 2019.
31 H. Lee, "A Study on Detection and Anaysis of Encrypted Steganography," Master Thesis, Korea National Defense University, 2010.
32 "The 'Self-Reunification Chungbuk Comrades Association' was arrested and indicted as an offender in the national security range", Cheongju District Prosecutors' Office, 16 Sep 2021. https://spo.go.kr/site/spo/ex/board/View.do?cbIdx=1403&bcIdx=1021884
33 "Self-Reunification Chungbuk Comrades Association wrote a bloody note to Kim Jong-un... 'We are Kim Jong-un's warriors'", JoongAng daily, 7 Aug 2021. https://www.joongang.co.kr/article/24123021
34 Suwon District Court Judgment case 2013gohap620, 624(merged), 699(merged), 851(merged)