Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 33063
A Novel Plausible Deniability Scheme in Secure Steganography
Authors: Farshad Amin, Majid Soleimanipour, Alireza Karimi
Abstract:
The goal of steganography is to avoid drawing suspicion to the transmission of a hidden message. If suspicion is raised, steganography may fail. The success of steganography depends on the secrecy of the action. If steganography is detected, the system will fail but data security depends on the robustness of the applied algorithm. In this paper, we propose a novel plausible deniability scheme in steganography by using a diversionary message and encrypt it with a DES-based algorithm. Then, we compress the secret message and encrypt it by the receiver-s public key along with the stego key and embed both messages in a carrier using an embedding algorithm. It will be demonstrated how this method can support plausible deniability and is robust against steganalysis.Keywords: Steganography, Cryptography, Information Hiding.
Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1080582
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2186References:
[1] Y.H. Yu, C.C. Cheng, Y.C. Hu, "Hiding secret data in image via predictive coding" , Pattern Recognition, Vol. 38, pp 691-705, 2005.
[2] Fisk G., Fisk, M., Papadopoulos, C., Joshua, N., "Eliminating Steganography in Internet Traffic with Active Wardens", Available:http://citeseer.nj.nec.com/fisk2eliminating.html, 2002
[3] Fabien A.B.P., Anderson R., Kuhn M.," Information Hiding- A Survey", in Proceeding of IEEE, pp. 1062-78, 1999.
[4] Potdar V., Chang E., "Visibly Invisible". Available: http://www.fit.cbs.curtin.edu.au/ceela/docs/index.php, 2004.
[5] Provos N., "Defending against statistical steganalysis", 10th USENIX Security Symposium, 2001.
[6] Sallee P., "Model-based steganography", International Workshop on Digital Watermarking, Seoul, Korea, 2003..
[7] Walton D., "Plausible Deniability and Evasion of Burden of Proof". Available: http://io.uwinnipeg.ca/~walton/96deniability.pdf, 1996.
[8] Canetti R., Dwork C., Naor M., Ostrovsky R.,"Deniable Encryption", Crypto '97, pp. 90-104, 1997.
[9] Chun-Hsiang Huang, Shang-Chih Chuang, Ja-Ling Wu, " Digital Invisible Ink and its Applications in Steganography", Proceeding of the 8th workshop on Multimedia and security, Geneva, Switzerland, pp. 23 - 28, 2006.