• 제목/요약/키워드: Steganography communication

검색결과 57건 처리시간 0.02초

Generative Linguistic Steganography: A Comprehensive Review

  • Xiang, Lingyun;Wang, Rong;Yang, Zhongliang;Liu, Yuling
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제16권3호
    • /
    • pp.986-1005
    • /
    • 2022
  • Text steganography is one of the most imminent and promising research interests in the information security field. With the unprecedented success of the neural network and natural language processing (NLP), the last years have seen a surge of research on generative linguistic steganography (GLS). This paper provides a thorough and comprehensive review to summarize the existing key contributions, and creates a novel taxonomy for GLS according to NLP techniques and steganographic encoding algorithm, then summarizes the characteristics of generative linguistic steganographic methods properly to analyze the relationship and difference between each type of them. Meanwhile, this paper also comprehensively introduces and analyzes several evaluation metrics to evaluate the performance of GLS from diverse perspective. Finally, this paper concludes the future research work, which is more conducive to the follow-up research and innovation of researchers.

Ultra-light Mutual Authentication Scheme based on Text Steganography Communication

  • Lee, Wan Yeon
    • 한국컴퓨터정보학회논문지
    • /
    • 제24권4호
    • /
    • pp.11-18
    • /
    • 2019
  • Previous mutual authentication schemes operate on the basis of validated cryptographic functions and hash functions, but these functions require a certain amount of memory capacity. However, since ultra-lightweight IoT devices have a very small amount of memory capacity, these functions can not be applied. In this paper, we first propose a text steganography communication scheme suitable for ultra-lightweight IoT devices with limited resources, and then propose a mutual authentication scheme based on the text steganography communication. The proposed scheme performs mutual authentication and integrity verification using very small amount of memory. For evaluation, we implemented the proposed scheme on Arduino boards and confirmed that the proposed scheme performs well the mutual authentication and the integrity verification functions.

Constructive Steganography by Tangles

  • Qian, Zhenxing;Pan, Lin;Huang, Nannan;Zhang, Xinpeng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제12권8호
    • /
    • pp.3911-3925
    • /
    • 2018
  • This paper proposes a novel steganography method to hide secret data during the generation of tangle patterns. Different from the traditional steganography based on modifying natural images, we propose to construct stego images according to the secret messages. We first create a model to group a selected image contour, and define some basic operations to generate various pattern cells. During data hiding, we create a cell library to establish the relationships between cells and secret data. By painting the cell inside the image contour, we create a dense tangle pattern to carry secret data. With the proposed method, a recipient can extract the secret data correctly. Experimental results show that the proposed method has a flexible embedding capacity. The constructed stego tangle image has good visual effects, and is secure against adversaries. Meanwhile, the stego tangle pattern is also robust to JPEG compression.

Detection for JPEG steganography based on evolutionary feature selection and classifier ensemble selection

  • Ma, Xiaofeng;Zhang, Yi;Song, Xiangfeng;Fan, Chao
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제11권11호
    • /
    • pp.5592-5609
    • /
    • 2017
  • JPEG steganography detection is an active research topic in the field of information hiding due to the wide use of JPEG image in social network, image-sharing websites, and Internet communication, etc. In this paper, a new steganalysis method for content-adaptive JPEG steganography is proposed by integrating the evolutionary feature selection and classifier ensemble selection. First, the whole framework of the proposed steganalysis method is presented and then the characteristic of the proposed method is analyzed. Second, the feature selection method based on genetic algorithm is given and the implement process is described in detail. Third, the method of classifier ensemble selection is proposed based on Pareto evolutionary optimization. The experimental results indicate the proposed steganalysis method can achieve a competitive detection performance by compared with the state-of-the-art steganalysis methods when used for the detection of the latest content-adaptive JPEG steganography algorithms.

Enhancing Data Protection in Digital Communication: A Novel Method of Combining Steganography and Encryption

  • Khaled H. Abuhmaidan;Marwan A. Al-Share;Abdallah M. Abualkishik;Ahmad Kayed
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제18권6호
    • /
    • pp.1619-1637
    • /
    • 2024
  • In today's highly digitized landscape, securing digital communication is paramount due to threats like hacking, unauthorized data access, and network policy violations. The response to these challenges has been the development of cryptography applications, though many existing techniques face issues of complexity, efficiency, and limitations. Notably, sophisticated intruders can easily discern encrypted data during transmission, casting doubt on overall security. In contrast to encryption, steganography offers the unique advantage of concealing data without easy detection, although it, too, grapples with challenges. The primary hurdles in image steganography revolve around the quality and payload capacity of the cover image, which are persistently compromised. This article introduces a pioneering approach that integrates image steganography and encryption, presenting the BitPatternStego method. This novel technique addresses prevalent issues in image steganography, such as stego-image quality and payload, by concealing secret data within image pixels with identical bit patterns as their characters. Consequently, concerns regarding the quality and payload capacity of steganographic images become obsolete. Moreover, the BitPatternStego method boasts the capability to generate millions of keys for the same secret message, offering a robust and versatile solution to the evolving landscape of digital security challenges.

SNS 메신저 환경에서의 썸네일 이미지 기반의 새로운 스테가노그래피 통신 기법 연구 (A Study on Novel Steganography Communication Technique based on Thumbnail Images in SNS Messenger Environment)

  • 육심언;조영호
    • 인터넷정보학회논문지
    • /
    • 제22권6호
    • /
    • pp.151-162
    • /
    • 2021
  • 스테가노그래피 기술은 은닉하고자 하는 정보를 미세한 노이즈의 형태로 변환하여 이미지, 비디오, 오디오 같은 멀티미디어 파일 속에 은닉함으로써 정보은닉 여부를 육안으로 알 수 없게 하는 것이 주 목적인 고도의 은닉기법으로, 각종 간첩 행위 및 사이버 공격에 악용되어 왔다. SNS 메신저는 스테가노그래피의 주요 매개체로 활용되는 멀티미디어 파일을 송수신하는데 있어서 다양한 장점을 가진 매력적인 플랫폼이다. 본 연구에서는 SNS 메신저 환경에서 썸네일 이미지의 활용을 통해 완전한 수신율을 보장하는 두 가지의 새로운 스테가노그래피 통신 기법을 제안했다. 또한, 대표적인 SNS 메신저인 카카오톡을 사용한 실제 환경에서 제안한 기법들에 대한 구현과 시험을 통해 실현 가능성을 검증하였다. 본 연구를 통해 새로운 유형의 스테가노그래피 통신 기법을 제안함으로써 스테가노그래피 기술의 위험성을 재평가하고, 상응하는 방어기법에 대한 후속 연구의 촉발을 도모한다.

텍스트 스테가노그래프의 개선된 접근과 연구 (A Study and improved Approach of Text Steganography)

  • 지선수
    • 한국산업정보학회논문지
    • /
    • 제19권5호
    • /
    • pp.51-56
    • /
    • 2014
  • 인터넷의 디지털 세상에서 스테가노그래피는 의심스럽지 않은 커버 매체 안에 비밀 메시지를 숨겨서 비밀 통신의 존재를 은닉하기 위해 도입되었다. 제 3자는 비밀 메시지가 전달되는 사실을 인식하지 못한다. 텍스트 기반 스테가노그래피 기법은 다양하게 적용할 수 있다. 이 논문에서는 존재하는 각각의 텍스트 스테가노그래픽 기법의 장점과 단점을 분석하고, 효율적인 접근 방법을 제시한다. 외부적 공격으로부터 비밀 메시지를 안전하게 숨기기 위해 재배열 순서키에 의한 방법을 제안한다.

Steganography: A Flexible Embedded Randomization Technique

  • Khaled H., Abuhmaidan;Ahmad K., Kayed;Maryam, Alrisia
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제17권1호
    • /
    • pp.120-144
    • /
    • 2023
  • With the expansion of digital communication networks, a considerable number of randomization techniques have been invented and implemented to enhance the different data transmission algorithms' levels of security. Steganography is among the data transmissions techniques used to hide secret data. Nowadays, several randomization techniques have been used in steganography to elevate the security of transmitted data. Unfortunately, the majority of these techniques lack some simplicity, efficiency, and flexibility, in addition to other limitations. This research presents a new randomization technique called Rand-Stego. Rand-Stego could be applied/practiced over any steganography technique. It provides simplicity and efficiency and elevates the security level. Examples of implementing the proposed technique on some steganography algorithms will be explored. The proposed and current techniques will be compared. The obtained results show Rand-Stego's superiority in terms of efficiency and flexibility when compared to the current techniques.

Audio Steganography Method Using Least Significant Bit (LSB) Encoding Technique

  • Alarood, Alaa Abdulsalm;Alghamdi, Ahmed Mohammed;Alzahrani, Ahmed Omar;Alzahrani, Abdulrahman;Alsolami, Eesa
    • International Journal of Computer Science & Network Security
    • /
    • 제22권7호
    • /
    • pp.427-442
    • /
    • 2022
  • MP3 is one of the most widely used file formats for encoding and representing audio data. One of the reasons for this popularity is their significant ability to reduce audio file sizes in comparison to other encoding techniques. Additionally, other reasons also include ease of implementation, its availability and good technical support. Steganography is the art of shielding the communication between two parties from the eyes of attackers. In steganography, a secret message in the form of a copyright mark, concealed communication, or serial number can be embedded in an innocuous file (e.g., computer code, video film, or audio recording), making it impossible for the wrong party to access the hidden message during the exchange of data. This paper describes a new steganography algorithm for encoding secret messages in MP3 audio files using an improved least significant bit (LSB) technique with high embedding capacity. Test results obtained shows that the efficiency of this technique is higher compared to other LSB techniques.

가변 ShiftRows를 이용한 하이브리드 기법에서 한글 메시지 은닉을 위한 이미지 스테가노그래피 (Image Steganography for Hiding Hangul Messages in Hybrid Technique using Variable ShiftRows)

  • 지선수
    • 한국정보전자통신기술학회논문지
    • /
    • 제15권4호
    • /
    • pp.217-222
    • /
    • 2022
  • 현대사회에서 정보는 중요한 역할을 한다. 대부분의 정보는 디지털 공간에서 처리되고, 이동된다. 사이버 공간에서 저항성과 보안성에 기반한 비밀 통신은 기본적인 사항이다. 네트워크를 통해 송신 및 수신되는 디지털 정보를 보호하는 것이 필수적이다. 그러나 권한이 없는 이용자에 의해 정보가 유출되고, 위변조 될 수 있다. 제3자에 의해 통신 내용을 파악하기 위한 혁신적인 기법이 적용됨에 따라 기존 보호 시스템의 효율성이 떨어진다. 스테가노그래피는 매개체의 특정 영역에 비밀정보를 삽입하는 기술이다. 스테가노그래피와 스테간 분석 기술은 상충관계에 있다. 고도화되어가는 스테간 분석에 대응하기 위해 새롭고, 정교한 구현 시스템이 필요하다. 단계별 확산 및 불규칙성을 강화하기 위해, 계층 암호화 및 가변 ShiftRows를 기반으로 하는 한글 메시지에 대한 이미지 스테가노그래피의 하이브리드 구현 기술을 제안한다. 제안된 스테가노그래피 효율성과 성능을 측정하기 위해 PSNR을 계산하였다. 기본 LSB 기법과 비교할 때 PSNR은 1.45% 감소하였으나 확산과 임의성을 증가시킬 수 있음을 보였다.