Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 33122
A New Authenticable Steganographic Method via the Use of Numeric Data on Public Websites
Authors: Che-Wei Lee, Bay-Erl Lai
Abstract:
A new steganographic method via the use of numeric data on public websites with a self-authentication capability is proposed. The proposed technique transforms a secret message into partial shares by Shamir’s (k, n)-threshold secret sharing scheme with n = k + 1. The generated k+1 partial shares then are embedded into the numeric items to be disguised as part of the website’s numeric content, yielding the stego numeric content. Afterward, a receiver links to the website and extracts every k shares among the k+1 ones from the stego numeric content to compute k+1 copies of the secret, and the phenomenon of value consistency of the computed k+1 copies is taken as an evidence to determine whether the extracted message is authentic or not, attaining the goal of self-authentication of the extracted secret message. Experimental results and discussions are provided to show the feasibility and effectiveness of the proposed method.Keywords: Steganography, data hiding, secret authentication, secret sharing.
Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1106897
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1671References:
[1] Shailender Gupta, Ankur Goyal, Bharat Bhushan,”Information Hiding Using Least Significant Bit Steganography and Cryptography.” International Journal of Modern Education and Computer Science, vol.4, no.6, pp.27-34, 2012.
[2] Khan, M. K., Naseem, M., Hussain, I. M. and Ajmal, A., “Distributed Least Significant Bit technique for data hiding in images.” 2011 IEEE 14th International Multitopic Conference (INMIC), pp. 149-154, 2011.
[3] Darabkh, K. A., Jafar, I. F., Al-Zubi, R. T., and Hawa, M., “An improved image least significant bit replacement method.” In Information and Communication Technology, Electronics and Microelectronics (MIPRO), 2014 37th International Convention on. IEEE. pp. 1182-1186, 2014.
[4] Da-Chun Wu and Wen-Hsiang Tsai, “A steganographic method for images by pixel-value differencing”, Pattern Recognition Letters, vol. 24, no. 9-10, pp. 1613–1626, 2003.
[5] Chung-Ming Wang, Nan-I Wu, Chwei-Shyong Tsai and Min-Shiang Hwang, “A high quality steganographic method with pixel-value differencing and modulus function.” Journal of Systems and Software, vol. 81, no. 1, pp. 150-158, 2008.
[6] Zhang, Xinpeng, and Shuozhong Wang. “Vulnerability of pixel-value differencing steganography to histogram analysis and modification for enhanced security.” Pattern Recognition Letters, vol. 25, no. 3, pp. 331-339, 2004.
[7] Lee, I-Shi, and Wen-Hsiang Tsai. “A new approach to covert communication via PDF files.” Signal Processing, vol. 90, no. 2, pp. 557-565, 2010.
[8] Park, Bora, Jungheum Park, and Sangjin Lee. “Data concealment and detection in Microsoft Office 2007 files.” Digital Investigation, vol. 5, no. 3-4, pp. 104-114, 2009.
[9] Gopalan, Kaliappan. “Audio steganography using bit modification.” Multimedia and Expo, 2003. ICME'03. Proceedings. 2003 International Conference on. IEEE, vol. 1, pp. I-629-32, 2003.
[10] Qazanfari, Kazem, and Reza Safabakhsh. “A new steganography method which preserves histogram: Generalization of LSB++.” Information Sciences, vol. 277, pp. 90-101, 2014.
[11] Lee, Yeuan-Kuen, and Ling-Hwei Chen. "An adaptive image steganographic model based on minimum-error lsb replacement." Nineth National Conference on Information Security. pp. 8-15, 1999.
[12] Chang, Chin-Chen, and Hsien-Wen Tseng. "A steganographic method for digital images using side match." Pattern Recognition Letters, vol. 25, no.12, pp. 1431-1437, 2004.
[13] Holub, Vojtěch, and Jessica Fridrich. "Digital image steganography using universal distortion." Proceedings of the first ACM workshop on Information hiding and multimedia security. ACM, pp. 59-68, 2013.
[14] Xinpeng Zhang. “Reversible data hiding in encrypted image.” Signal Processing Letters, IEEE, vol. 18, no. 4, pp. 255-258, 2011.
[15] C. W. Lee and W. H. Tsai, “A Covert Communication Method via Spreadsheets by Secret Sharing with a Self-Authentication Capability,” Journal of Systems and Software, vol. 86, no. 2, pp. 324-334, 2013.
[16] A. Shamir, “How to share a secret,” Communication of ACM, vol. 22, pp. 612–613, 1979.