Steganography is a technology used since years for the communication of messages secretly. These secret messages are put inside honest carriers. Carriers can be digital images, audio files, video files and so on. The limitation in sending concealed longer messages has been overcoming by the inclusion of video files as carriers. Popular internet services such as Skype, BitTorrent, Google Suggest, and
WLANs are targets of information hiding techniques. Nowadays, plotters are not only using the carriers but also the protocols for communication that regulate the path of the carrier through the Internet. This technique is named Network Steganography.
Data security using stegnography and quantum cryptographyAlexander Decker
The document proposes using a combination of steganography and quantum cryptography to securely transmit encrypted data. It begins by providing background on steganography, describing how it hides confidential information within cover files like images, and how it differs from encryption and digital watermarking. It then discusses related work improving steganography techniques. The proposed approach uses an advanced steganography algorithm (F5) to hide encrypted data within an image, making the secret information nearly impossible to detect. It also describes using quantum cryptography to securely generate and distribute the encryption key, providing virtually unbreakable security based on principles of quantum mechanics. The combination of steganography and quantum key distribution is argued to provide perfect security for transmitted data.
A Survey on Enhancement of Text Security Using Steganography and Cryptographi...ijtsrd
The document discusses enhancing text security using steganography and cryptographic techniques. It begins by introducing steganography and cryptography as techniques for securing data transfer. It then reviews various literature on combining these techniques. The document outlines different steganography techniques including least significant bit and transform domain methods. It also describes symmetric and public key cryptography systems. The key proposal is that combining cryptography and steganography provides multiple layers of security by encrypting data then hiding it within a cover file, such as an image. Encrypting the data first using cryptography before applying steganography makes the hidden data more secure and difficult to extract without the proper keys.
This document discusses steganography, which is a method of hiding secret messages within other files or data streams. It provides definitions and examples of different types of steganography, including static steganography which hides messages in digital files, and dynamic steganography which hides messages in protocols like TCP/IP packets as they are transmitted over the internet. The document also discusses uses of steganography, such as watermarking to track copyrighted content, and concerns about potential terrorist use of steganography over the internet through covert channels. Detection of hidden messages, called steganalysis, and technology to help law enforcement monitor covert communications are also mentioned.
Steganography using Interpolation and LSB with Cryptography on Video Images -...Editor IJCATR
Steg
nography is the most common term used in
the IT industry, which specifically means, "covered writing" and is derive
d
from the Greek language. Steg
nography is defined as the art and science of invisible communication i.e. it hides the existence of the
communication between the sender and the rece
iver. In distinction to Cryptography, where the opponent is permitted to detect,
interrupt and alter messages without being able to breach definite security grounds guaranteed by the cryptosyst
em, the prime
objective of Steg
nography is to conceal messages
inside other risk
-
free messages in a manner that does not agree to any enemy to even
sense that there is any second message present. Nowadays,
it is an emerging area which is used for secured data transmission over any
public medium such as internet. In th
is research a novel approach of image
steg
nography
based on LSB (Least Significant Bit)
insertion and cryptography method for the lossless jpeg images has been projected. This paper is comprising an application wh
ich
ranks images in a users library on the
basis of their appropriateness as cover objects for some facts. Here, the data is matched to an
image, so there is a less possibility of an invader being able to employ steganalysis to recuperate the data. Furthermore, th
e application
first encrypts the da
ta by means of cryptography and message bits that are to be hidden are embedded into the image using Least
Significant Bits insertion technique. Moreover, interpolation is used to increase the density
Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
This document proposes a technique for hiding one image within another image using a combination of two steganography algorithms: the five modulus method (FMM) and least significant bit (LSB) substitution. The secret image is partitioned into two parts, with 75% hidden using FMM and 25% hidden using LSB substitution within the cover image. Additionally, a private stego-key is used with FMM to increase security. This nesting of algorithms along with a password is intended to make unauthorized extraction of the hidden image from the cover image more difficult. The document discusses related work in image steganography techniques and provides details of the proposed methodology. It is expected that this approach will achieve a good balance between security and
A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...IJNSA Journal
In today’s day and age when everything is done with the aid of computing technology, the need for confidential communication has drastically increased. Not only the sensitive data such as top intelligent secrets of our nation but personal information of common people needs to be secure. Several combinations of cryptography and steganography techniques in different ways are used by researchers over the past to protect the data being transmitted. Cryptography uses mathematical algorithms to convert the data into an incomprehensible form and Steganography, on the other hand hides the data in a carrier such as image, data, audio or video. Cryptography provides necessary mechanisms for providing accountability, accuracy and confidentiality in public communication mediums such as the Internet and steganography is used in other fields such as copyright, preventing e-document forging etc. We are of the opinion that this security mechanism can further be increased by incorporating the use of Huffman coding in order to reduce the data length. This paper is an effort in the direction to hide, secure and compress the data. It explains the executed procedure by applying various encryption techniques one by one and our aim is to get the best security out of the existing ones. The proposed technique is implemented in MATLAB2016a and the results shown in this paper that our technique is better approach then the conventional techniques.
This document proposes a novel approach for data hiding in web pages using steganography with encryption and compression techniques. It discusses embedding data into HTML web pages by first compressing the data using Huffman coding and then encrypting it before hiding it in the HTML code by modifying attributes like width, height, etc. of images. The proposed method is implemented and experimental results show it achieves high embedding capacity and security by combining compression, encryption and steganography for web pages. Future work could explore using different compression and encryption techniques to improve the results further.
Data security using stegnography and quantum cryptographyAlexander Decker
The document proposes using a combination of steganography and quantum cryptography to securely transmit encrypted data. It begins by providing background on steganography, describing how it hides confidential information within cover files like images, and how it differs from encryption and digital watermarking. It then discusses related work improving steganography techniques. The proposed approach uses an advanced steganography algorithm (F5) to hide encrypted data within an image, making the secret information nearly impossible to detect. It also describes using quantum cryptography to securely generate and distribute the encryption key, providing virtually unbreakable security based on principles of quantum mechanics. The combination of steganography and quantum key distribution is argued to provide perfect security for transmitted data.
A Survey on Enhancement of Text Security Using Steganography and Cryptographi...ijtsrd
The document discusses enhancing text security using steganography and cryptographic techniques. It begins by introducing steganography and cryptography as techniques for securing data transfer. It then reviews various literature on combining these techniques. The document outlines different steganography techniques including least significant bit and transform domain methods. It also describes symmetric and public key cryptography systems. The key proposal is that combining cryptography and steganography provides multiple layers of security by encrypting data then hiding it within a cover file, such as an image. Encrypting the data first using cryptography before applying steganography makes the hidden data more secure and difficult to extract without the proper keys.
This document discusses steganography, which is a method of hiding secret messages within other files or data streams. It provides definitions and examples of different types of steganography, including static steganography which hides messages in digital files, and dynamic steganography which hides messages in protocols like TCP/IP packets as they are transmitted over the internet. The document also discusses uses of steganography, such as watermarking to track copyrighted content, and concerns about potential terrorist use of steganography over the internet through covert channels. Detection of hidden messages, called steganalysis, and technology to help law enforcement monitor covert communications are also mentioned.
Steganography using Interpolation and LSB with Cryptography on Video Images -...Editor IJCATR
Steg
nography is the most common term used in
the IT industry, which specifically means, "covered writing" and is derive
d
from the Greek language. Steg
nography is defined as the art and science of invisible communication i.e. it hides the existence of the
communication between the sender and the rece
iver. In distinction to Cryptography, where the opponent is permitted to detect,
interrupt and alter messages without being able to breach definite security grounds guaranteed by the cryptosyst
em, the prime
objective of Steg
nography is to conceal messages
inside other risk
-
free messages in a manner that does not agree to any enemy to even
sense that there is any second message present. Nowadays,
it is an emerging area which is used for secured data transmission over any
public medium such as internet. In th
is research a novel approach of image
steg
nography
based on LSB (Least Significant Bit)
insertion and cryptography method for the lossless jpeg images has been projected. This paper is comprising an application wh
ich
ranks images in a users library on the
basis of their appropriateness as cover objects for some facts. Here, the data is matched to an
image, so there is a less possibility of an invader being able to employ steganalysis to recuperate the data. Furthermore, th
e application
first encrypts the da
ta by means of cryptography and message bits that are to be hidden are embedded into the image using Least
Significant Bits insertion technique. Moreover, interpolation is used to increase the density
Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
This document proposes a technique for hiding one image within another image using a combination of two steganography algorithms: the five modulus method (FMM) and least significant bit (LSB) substitution. The secret image is partitioned into two parts, with 75% hidden using FMM and 25% hidden using LSB substitution within the cover image. Additionally, a private stego-key is used with FMM to increase security. This nesting of algorithms along with a password is intended to make unauthorized extraction of the hidden image from the cover image more difficult. The document discusses related work in image steganography techniques and provides details of the proposed methodology. It is expected that this approach will achieve a good balance between security and
A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...IJNSA Journal
In today’s day and age when everything is done with the aid of computing technology, the need for confidential communication has drastically increased. Not only the sensitive data such as top intelligent secrets of our nation but personal information of common people needs to be secure. Several combinations of cryptography and steganography techniques in different ways are used by researchers over the past to protect the data being transmitted. Cryptography uses mathematical algorithms to convert the data into an incomprehensible form and Steganography, on the other hand hides the data in a carrier such as image, data, audio or video. Cryptography provides necessary mechanisms for providing accountability, accuracy and confidentiality in public communication mediums such as the Internet and steganography is used in other fields such as copyright, preventing e-document forging etc. We are of the opinion that this security mechanism can further be increased by incorporating the use of Huffman coding in order to reduce the data length. This paper is an effort in the direction to hide, secure and compress the data. It explains the executed procedure by applying various encryption techniques one by one and our aim is to get the best security out of the existing ones. The proposed technique is implemented in MATLAB2016a and the results shown in this paper that our technique is better approach then the conventional techniques.
This document proposes a novel approach for data hiding in web pages using steganography with encryption and compression techniques. It discusses embedding data into HTML web pages by first compressing the data using Huffman coding and then encrypting it before hiding it in the HTML code by modifying attributes like width, height, etc. of images. The proposed method is implemented and experimental results show it achieves high embedding capacity and security by combining compression, encryption and steganography for web pages. Future work could explore using different compression and encryption techniques to improve the results further.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...IOSR Journals
Abstract: Steganography is the art of hiding the fact that communication is taking place, by hiding information
in other information. There are many application of Steganography with different carrier file format. Here we
perform Steganography Technique with sending OTP on receiver mobile, which is one of the best secured
technique in current scenario. This technique is hiding file information into image with OTP password that is
only known by receiver. And can decrypt using that OTP only this is pure Steganography. Pure Steganography
means that there is none prior information shared by two communication parties. We are not sharing OTP
information by two communication parties. So this is more secure than other technique.
Key Words : Steganography, OTP, ICT, Password, IP, UDP, SIHS, LSB.
A brief over overview of steganographical security techniques and how it has been applied, is applied and will continue to be applied in maintaining confidentiality between two communication parties
Steganography and Its Applications in SecurityIJMER
ABSTRACT: Steganography is the dark cousin of cryptography, the use of codes. While cryptography provides privacy,
steganography is intended to provide secrecy. Steganography is a method of covertly communicating. Steganography is a
process that involves hiding a message in an appropriate carrier for example an image or an audio file. The carrier can then
be sent to a receiver without anyone else knowing that it contains a hidden message. This is a process, which can be used for
example by civil rights organizations in repressive states to communicate their message to the outside world without their
own government being aware of it. In this article we have tried to elucidate the different approaches towards implementation
of Steganography using ‘multimedia’ file (text, static image, audio and video). Steganalysis is a newly emerging branch of
data processing that seeks the identification of steganographic covers, and if possible message extraction. It is similar to
cryptanalysis in cryptography. The technique is ancient emerging monster that have gained immutable notice as it have
newly penetrated the world of digital communication security. Objective is not only to prevent the message being read but
also to hide its existence.
Keywords: Carrier, Privacy, Secrecy, Steganalysis, Steganography
This document discusses various techniques for hiding secret information in digital video files for secure communication, known as video steganography. It begins by explaining steganography and comparing it to cryptography. It then discusses different video steganography methods, including least significant bit and spread spectrum approaches. It also covers combining steganography with encryption algorithms like AES. Previous research on video steganography is summarized, focusing on techniques that embed data in wavelet coefficients or motion vectors. The document concludes that further research could explore hiding moving images within video files using steganography and cryptography methods.
This document discusses steganography techniques for hiding secret information in digital images. It begins with an introduction to steganography and its differences from cryptography. It then discusses various steganography techniques including least significant bit insertion, masking and filtering, and transform domain techniques. It also discusses using bitmap images for steganography and the popularity of formats like JPEG. The goal of the document is to provide an overview of digital image steganography techniques.
Hiding Text within Image Using LSB ReplacementIOSR Journals
The document proposes a new algorithm for hiding text within a gray image using least significant bit (LSB) replacement with increased security. The algorithm generates a random key between 1-256 to encrypt the text before embedding it in the image. It uses XOR and AND logic operations to modify the LSB of pixel values and embed the encrypted text. Experimental results show the embedded text can be concealed within the image while maintaining high image quality with PSNR values over 75dB. The algorithm aims to improve upon basic LSB techniques by adding an encryption step using a random key to enhance security of the hidden text.
A Robust Technique to Encrypt and Decrypt Confidential Data within Imageinventionjournals
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
This document provides an overview of steganography presented by four students. It defines steganography as hiding secret communications such that others do not know of the message's existence. The document outlines the history of steganography, modern applications, types of techniques including LSB substitution and transform domains, characteristics, classifications, uses in text, images, and networks, and challenges around detection. It concludes that steganography allows covert transmission of secrets but also poses challenges for network monitoring.
Review paper on Data Security using Cryptography and Steganographyvivatechijri
One of the major problems faced by this digital world is Data Security. Data Security plays an important role in the field of information technology. As there are large advancements in internet technology, there has been huge text as well as multimedia data transfer over the internet. The communication channel available for data transfer from the transmitter to receiver is highly insecure. As the security of electronic data is a major issue and to achieve high security and confidentiality, the public and the private sectors use different kinds of techniques and methods to protect the data from unauthorized users. Cryptography and Steganography are the most popular and widely used technologies for security. Cryptography is the art of hiding information by encryption and steganography is a technique to hides data in the cover medium. Cryptography hides the readable and meaningful contents of the data. And the existence of the data is hidden by the Steganography technique.
This document discusses network security and steganography. It defines steganography as concealing a secret message within an innocent-looking cover file so the message's very existence is hidden. Cryptography renders messages unintelligible but steganography hides the message's existence. The document outlines various digital steganography techniques like hiding messages in image/audio/video file formats by modifying least significant bits. It also discusses advantages like difficulty of detection and disadvantages like overhead. Combined with cryptography, steganography provides robust covert communication. The document predicts advancements in steganalysis to detect even small hidden messages.
COMBINING JPEG STEGANOGRAPHY AND SUBSTITUTION ENCRYPTION FOR SECURE DATA COMM...cscpconf
The Internet is a method of communication to distribute information to the masses. Digital
image are excellent carriers for hidden information. Steganography and cryptography are
technologies that are used for secret and secured communications. In both the methods, secret
message is exchanged between two groups, sender and receiver. The main purpose in
cryptography is to make massage concept unintelligible, while steganography aims to hide
secret message. We propose a method of combining steganography, cryptography for secret
data communication. In this paper, we propose a high-performance JPEG steganography along
with a substitution encryption methodology. This approach uses the discrete cosine transform
(DCT) technique which used in the frequency domain for hiding data within image. It is very
difficult to detect hidden message in frequency domain and for this reason we use
steganography based on DCT. From the experimental results, we obtain that the proposed
method has a larger message capacity. Experimental results show that the correlation and
entropy values of the image with encrypted data before the insertion are similar to the values of
correlation and entropy after the insertion thus reduces the chance of the confidential message
being detected and enables secret communication. The image that contains the hidden data will
be used by the receiver to reconstruct the same secret message after extracting it. The
effectiveness of the proposed method has been estimated by computing Mean square error (MSE) and Peak Signal to Noise Ratio (PSNR). Experimental results show the method provides high security and the information is safe from various attacks.
Fall 2014 Symposium Poster CIS4365 Security-Disastr Prep.pptxMichael Belyea
Steganography is the hiding of information within other information. It has a long history dating back to ancient Greece but modern digital steganography allows hiding data in files like images, audio, and video. Data can be hidden in the least significant bits or file headers/footers. While steganography aims to conceal the very existence of hidden data, cryptanalysis techniques may be able to detect hidden information by analyzing statistical properties of files. For security, steganography should be combined with encryption since hiding data alone provides only security through obscurity.
This document provides a survey of metamorphic cryptography techniques. It begins with an introduction to cryptography and steganography individually, explaining how cryptography encrypts messages and steganography hides messages. It then discusses the benefits of combining these approaches in metamorphic cryptography, including providing multiple layers of security. Two examples of metamorphic cryptography techniques are described: one using static parsing steganography to hide bits of a secret message in cover image pixels, and another combining AES encryption with discrete cosine transform to hide encrypted text in an image. The document concludes that non-metamorphic approaches are less secure because they rely on single methodologies and simpler encoding algorithms.
Design of Transport Layer Based Hybrid Covert Channel Detection Engineijasuc
Computer network is unpredictable due to information warfare and is prone to various
attacks. Such attacks on network compromise the most important attribute, the privacy. Most of such
attacks are devised using special communication channel called ``Covert Channel''. The word ``Covert''
stands for hidden or non-transparent. Network Covert Channel is a concealed communication path within
legitimate network communication that clearly violates security policies laid down. The non-transparency
in covert channel is also referred to as trapdoor. A trapdoor is unintended design within legitimate
communication whose motto is to leak information. Subliminal channel, a variant of covert channel works
similarly except that the trapdoor is set in a cryptographic algorithm. A composition of covert channel with
subliminal channel is the ``Hybrid Covert Channel''. Hybrid covert channel is homogenous or
heterogeneous mixture of two or more variants of covert channels either active at same instance or at
different instances of time. Detecting such malicious channel activity plays a vital role in removing threat
to the legitimate network. In this paper, we present a study of multi-trapdoor covert channels and
introduce design of a new detection engine for hybrid covert channel in transport layer visualized in TCP
and SSL.
LSB Based Stegnography to Enhance the Security of an Imageijtsrd
Steganography is the technique of hiding a secret message or information in a cover message like an image, text or sound in such a way that only the desired or intended recipient knows about the existence of the secret data. It can be defined as the study of invisible communication which usually deals with the technique of hiding the existence of the secret message. The hidden message may be in the form of text, image, audio and video etc. An image after inserting the secret message into it by using a stego key is known as a stego image. Nowadays steganography is important due to an exponential growth in secret communication by potential computer users over the internet. In this paper we have analyzed the various steganography techniques and propose to enhance the security of the secret message by random selection of the keys to extract the secret message and working towards increasing the PSNR Peak Signal to Noise Ratio and decreasing the MSE Mean Square Error . Naveen Verma | Preeti Sondhi | Gargi Kalia ""LSB Based Stegnography to Enhance the Security of an Image"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-4 , June 2019, URL: https://www.ijtsrd.com/papers/ijtsrd25163.pdf
Paper URL: https://www.ijtsrd.com/engineering/computer-engineering/25163/lsb-based-stegnography-to-enhance-the-security-of-an-image/naveen-verma
This document is a project report for a BTech student named Rohit Jaiswal on image and audio steganography. It discusses hiding text messages in digital images and audio files. The report includes an introduction to steganography and cryptography, an analysis of digital images and audio, the design of the steganography system including algorithms, and implementations in C# and Flash. It also covers inputs, outputs, and conclusions with references and source code in the appendix. The supervisor of the project is Mr. Rajeev Srivastava of the Computer Science department at Banaras Hindu University.
The peer-reviewed International Journal of Engineering Inventions (IJEI) is started with a mission to encourage contribution to research in Science and Technology. Encourage and motivate researchers in challenging areas of Sciences and Technology.
This document outlines a project on text steganography. It was submitted by Aditya Pandey from the University of Allahabad as part of their Bachelor of Computer Application degree from 2019-2022. The project aims to develop a simple and user-friendly application for hiding secret information in digital images using steganography techniques. The application will have encryption and decryption modules to hide data within an image file and later extract the hidden information. The project was developed in Java using the NetBeans IDE and allows hiding any file type within an image file.
BEHAVIOUR OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS INVESTIGATED FOR EME...ijwmn
Mobile Ad hoc Networks are open, shared, dynamic and self-organized networks. These distinct nature
lead to efficient use in emergency and recue scenarios where the sharing of information is necessary. In
order to share information within the network, a proper routing protocol is required to establish routes
between nodes. This article discusses which of the routing protocols such as reactive or proactive has
better performance in such scenario. In order to implement the test bed, we choose a real area in
Uttarakhand state, India where the disaster occurred recently hence so many civilizations had vanished
due to lack of communication and failure in recovery. Our aim is to choose an optimum routing protocol
that is correct and used for efficient route establishment between nodes so that message could be delivered
on time without loss and it will be implemented and used in future based on the model that we propose.
DEVICE-TO-DEVICE (D2D) COMMUNICATION UNDER LTE-ADVANCED NETWORKSijwmn
Device-to-Device (D2D) communication is a new technology that offer many advantages for the LTEadvanced
network such us wireless peer-to-peer services and higher spectral efficiency. It is also
considered as one of promising techniques for the 5G wireless communications system and used in so
many different fields such as network traffic offloading, public safety, social services and applications such
as gaming and military applications . The goal of this paper is to present advances on the current 3GPP
LTE-advanced system related to Device-to-Device (D2D). In this paper, we provide an overview of the
D2D types based on the communication spectrum of D2D transmission, namely Inband D2D
communication and Outband D2D communication. Then we present the advantages and disadvantages of
each D2D mode. Moreover, architecture and protocol enhancements for D2D communications under
LTE-A network are described.
Interference management in lte downlink networksijwmn
Two major challenges for evolving LTE (Long Term Evolution) networks are to achieve enhanced system capacity and cell coverage compared with WCDMA (Wideband Code Division Multiple Access) system. Effective utilization of radio resources as well as dense spectrum reuse are at the core to attain these targets. However, dense frequency reuse may increase inter-cell interference, which in turn severely limits the capacity of users in the system. Inter-cell interference can restrict overall system performance in terms of throughput and spectral efficiency, especially for the users located at the cell edge area. Hence, careful management of inter-cell interferences becomes crucial to improve LTE system performance. In this paper, interference mitigation schemes for LTE downlink networks are investigated.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...IOSR Journals
Abstract: Steganography is the art of hiding the fact that communication is taking place, by hiding information
in other information. There are many application of Steganography with different carrier file format. Here we
perform Steganography Technique with sending OTP on receiver mobile, which is one of the best secured
technique in current scenario. This technique is hiding file information into image with OTP password that is
only known by receiver. And can decrypt using that OTP only this is pure Steganography. Pure Steganography
means that there is none prior information shared by two communication parties. We are not sharing OTP
information by two communication parties. So this is more secure than other technique.
Key Words : Steganography, OTP, ICT, Password, IP, UDP, SIHS, LSB.
A brief over overview of steganographical security techniques and how it has been applied, is applied and will continue to be applied in maintaining confidentiality between two communication parties
Steganography and Its Applications in SecurityIJMER
ABSTRACT: Steganography is the dark cousin of cryptography, the use of codes. While cryptography provides privacy,
steganography is intended to provide secrecy. Steganography is a method of covertly communicating. Steganography is a
process that involves hiding a message in an appropriate carrier for example an image or an audio file. The carrier can then
be sent to a receiver without anyone else knowing that it contains a hidden message. This is a process, which can be used for
example by civil rights organizations in repressive states to communicate their message to the outside world without their
own government being aware of it. In this article we have tried to elucidate the different approaches towards implementation
of Steganography using ‘multimedia’ file (text, static image, audio and video). Steganalysis is a newly emerging branch of
data processing that seeks the identification of steganographic covers, and if possible message extraction. It is similar to
cryptanalysis in cryptography. The technique is ancient emerging monster that have gained immutable notice as it have
newly penetrated the world of digital communication security. Objective is not only to prevent the message being read but
also to hide its existence.
Keywords: Carrier, Privacy, Secrecy, Steganalysis, Steganography
This document discusses various techniques for hiding secret information in digital video files for secure communication, known as video steganography. It begins by explaining steganography and comparing it to cryptography. It then discusses different video steganography methods, including least significant bit and spread spectrum approaches. It also covers combining steganography with encryption algorithms like AES. Previous research on video steganography is summarized, focusing on techniques that embed data in wavelet coefficients or motion vectors. The document concludes that further research could explore hiding moving images within video files using steganography and cryptography methods.
This document discusses steganography techniques for hiding secret information in digital images. It begins with an introduction to steganography and its differences from cryptography. It then discusses various steganography techniques including least significant bit insertion, masking and filtering, and transform domain techniques. It also discusses using bitmap images for steganography and the popularity of formats like JPEG. The goal of the document is to provide an overview of digital image steganography techniques.
Hiding Text within Image Using LSB ReplacementIOSR Journals
The document proposes a new algorithm for hiding text within a gray image using least significant bit (LSB) replacement with increased security. The algorithm generates a random key between 1-256 to encrypt the text before embedding it in the image. It uses XOR and AND logic operations to modify the LSB of pixel values and embed the encrypted text. Experimental results show the embedded text can be concealed within the image while maintaining high image quality with PSNR values over 75dB. The algorithm aims to improve upon basic LSB techniques by adding an encryption step using a random key to enhance security of the hidden text.
A Robust Technique to Encrypt and Decrypt Confidential Data within Imageinventionjournals
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
This document provides an overview of steganography presented by four students. It defines steganography as hiding secret communications such that others do not know of the message's existence. The document outlines the history of steganography, modern applications, types of techniques including LSB substitution and transform domains, characteristics, classifications, uses in text, images, and networks, and challenges around detection. It concludes that steganography allows covert transmission of secrets but also poses challenges for network monitoring.
Review paper on Data Security using Cryptography and Steganographyvivatechijri
One of the major problems faced by this digital world is Data Security. Data Security plays an important role in the field of information technology. As there are large advancements in internet technology, there has been huge text as well as multimedia data transfer over the internet. The communication channel available for data transfer from the transmitter to receiver is highly insecure. As the security of electronic data is a major issue and to achieve high security and confidentiality, the public and the private sectors use different kinds of techniques and methods to protect the data from unauthorized users. Cryptography and Steganography are the most popular and widely used technologies for security. Cryptography is the art of hiding information by encryption and steganography is a technique to hides data in the cover medium. Cryptography hides the readable and meaningful contents of the data. And the existence of the data is hidden by the Steganography technique.
This document discusses network security and steganography. It defines steganography as concealing a secret message within an innocent-looking cover file so the message's very existence is hidden. Cryptography renders messages unintelligible but steganography hides the message's existence. The document outlines various digital steganography techniques like hiding messages in image/audio/video file formats by modifying least significant bits. It also discusses advantages like difficulty of detection and disadvantages like overhead. Combined with cryptography, steganography provides robust covert communication. The document predicts advancements in steganalysis to detect even small hidden messages.
COMBINING JPEG STEGANOGRAPHY AND SUBSTITUTION ENCRYPTION FOR SECURE DATA COMM...cscpconf
The Internet is a method of communication to distribute information to the masses. Digital
image are excellent carriers for hidden information. Steganography and cryptography are
technologies that are used for secret and secured communications. In both the methods, secret
message is exchanged between two groups, sender and receiver. The main purpose in
cryptography is to make massage concept unintelligible, while steganography aims to hide
secret message. We propose a method of combining steganography, cryptography for secret
data communication. In this paper, we propose a high-performance JPEG steganography along
with a substitution encryption methodology. This approach uses the discrete cosine transform
(DCT) technique which used in the frequency domain for hiding data within image. It is very
difficult to detect hidden message in frequency domain and for this reason we use
steganography based on DCT. From the experimental results, we obtain that the proposed
method has a larger message capacity. Experimental results show that the correlation and
entropy values of the image with encrypted data before the insertion are similar to the values of
correlation and entropy after the insertion thus reduces the chance of the confidential message
being detected and enables secret communication. The image that contains the hidden data will
be used by the receiver to reconstruct the same secret message after extracting it. The
effectiveness of the proposed method has been estimated by computing Mean square error (MSE) and Peak Signal to Noise Ratio (PSNR). Experimental results show the method provides high security and the information is safe from various attacks.
Fall 2014 Symposium Poster CIS4365 Security-Disastr Prep.pptxMichael Belyea
Steganography is the hiding of information within other information. It has a long history dating back to ancient Greece but modern digital steganography allows hiding data in files like images, audio, and video. Data can be hidden in the least significant bits or file headers/footers. While steganography aims to conceal the very existence of hidden data, cryptanalysis techniques may be able to detect hidden information by analyzing statistical properties of files. For security, steganography should be combined with encryption since hiding data alone provides only security through obscurity.
This document provides a survey of metamorphic cryptography techniques. It begins with an introduction to cryptography and steganography individually, explaining how cryptography encrypts messages and steganography hides messages. It then discusses the benefits of combining these approaches in metamorphic cryptography, including providing multiple layers of security. Two examples of metamorphic cryptography techniques are described: one using static parsing steganography to hide bits of a secret message in cover image pixels, and another combining AES encryption with discrete cosine transform to hide encrypted text in an image. The document concludes that non-metamorphic approaches are less secure because they rely on single methodologies and simpler encoding algorithms.
Design of Transport Layer Based Hybrid Covert Channel Detection Engineijasuc
Computer network is unpredictable due to information warfare and is prone to various
attacks. Such attacks on network compromise the most important attribute, the privacy. Most of such
attacks are devised using special communication channel called ``Covert Channel''. The word ``Covert''
stands for hidden or non-transparent. Network Covert Channel is a concealed communication path within
legitimate network communication that clearly violates security policies laid down. The non-transparency
in covert channel is also referred to as trapdoor. A trapdoor is unintended design within legitimate
communication whose motto is to leak information. Subliminal channel, a variant of covert channel works
similarly except that the trapdoor is set in a cryptographic algorithm. A composition of covert channel with
subliminal channel is the ``Hybrid Covert Channel''. Hybrid covert channel is homogenous or
heterogeneous mixture of two or more variants of covert channels either active at same instance or at
different instances of time. Detecting such malicious channel activity plays a vital role in removing threat
to the legitimate network. In this paper, we present a study of multi-trapdoor covert channels and
introduce design of a new detection engine for hybrid covert channel in transport layer visualized in TCP
and SSL.
LSB Based Stegnography to Enhance the Security of an Imageijtsrd
Steganography is the technique of hiding a secret message or information in a cover message like an image, text or sound in such a way that only the desired or intended recipient knows about the existence of the secret data. It can be defined as the study of invisible communication which usually deals with the technique of hiding the existence of the secret message. The hidden message may be in the form of text, image, audio and video etc. An image after inserting the secret message into it by using a stego key is known as a stego image. Nowadays steganography is important due to an exponential growth in secret communication by potential computer users over the internet. In this paper we have analyzed the various steganography techniques and propose to enhance the security of the secret message by random selection of the keys to extract the secret message and working towards increasing the PSNR Peak Signal to Noise Ratio and decreasing the MSE Mean Square Error . Naveen Verma | Preeti Sondhi | Gargi Kalia ""LSB Based Stegnography to Enhance the Security of an Image"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-4 , June 2019, URL: https://www.ijtsrd.com/papers/ijtsrd25163.pdf
Paper URL: https://www.ijtsrd.com/engineering/computer-engineering/25163/lsb-based-stegnography-to-enhance-the-security-of-an-image/naveen-verma
This document is a project report for a BTech student named Rohit Jaiswal on image and audio steganography. It discusses hiding text messages in digital images and audio files. The report includes an introduction to steganography and cryptography, an analysis of digital images and audio, the design of the steganography system including algorithms, and implementations in C# and Flash. It also covers inputs, outputs, and conclusions with references and source code in the appendix. The supervisor of the project is Mr. Rajeev Srivastava of the Computer Science department at Banaras Hindu University.
The peer-reviewed International Journal of Engineering Inventions (IJEI) is started with a mission to encourage contribution to research in Science and Technology. Encourage and motivate researchers in challenging areas of Sciences and Technology.
This document outlines a project on text steganography. It was submitted by Aditya Pandey from the University of Allahabad as part of their Bachelor of Computer Application degree from 2019-2022. The project aims to develop a simple and user-friendly application for hiding secret information in digital images using steganography techniques. The application will have encryption and decryption modules to hide data within an image file and later extract the hidden information. The project was developed in Java using the NetBeans IDE and allows hiding any file type within an image file.
BEHAVIOUR OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS INVESTIGATED FOR EME...ijwmn
Mobile Ad hoc Networks are open, shared, dynamic and self-organized networks. These distinct nature
lead to efficient use in emergency and recue scenarios where the sharing of information is necessary. In
order to share information within the network, a proper routing protocol is required to establish routes
between nodes. This article discusses which of the routing protocols such as reactive or proactive has
better performance in such scenario. In order to implement the test bed, we choose a real area in
Uttarakhand state, India where the disaster occurred recently hence so many civilizations had vanished
due to lack of communication and failure in recovery. Our aim is to choose an optimum routing protocol
that is correct and used for efficient route establishment between nodes so that message could be delivered
on time without loss and it will be implemented and used in future based on the model that we propose.
DEVICE-TO-DEVICE (D2D) COMMUNICATION UNDER LTE-ADVANCED NETWORKSijwmn
Device-to-Device (D2D) communication is a new technology that offer many advantages for the LTEadvanced
network such us wireless peer-to-peer services and higher spectral efficiency. It is also
considered as one of promising techniques for the 5G wireless communications system and used in so
many different fields such as network traffic offloading, public safety, social services and applications such
as gaming and military applications . The goal of this paper is to present advances on the current 3GPP
LTE-advanced system related to Device-to-Device (D2D). In this paper, we provide an overview of the
D2D types based on the communication spectrum of D2D transmission, namely Inband D2D
communication and Outband D2D communication. Then we present the advantages and disadvantages of
each D2D mode. Moreover, architecture and protocol enhancements for D2D communications under
LTE-A network are described.
Interference management in lte downlink networksijwmn
Two major challenges for evolving LTE (Long Term Evolution) networks are to achieve enhanced system capacity and cell coverage compared with WCDMA (Wideband Code Division Multiple Access) system. Effective utilization of radio resources as well as dense spectrum reuse are at the core to attain these targets. However, dense frequency reuse may increase inter-cell interference, which in turn severely limits the capacity of users in the system. Inter-cell interference can restrict overall system performance in terms of throughput and spectral efficiency, especially for the users located at the cell edge area. Hence, careful management of inter-cell interferences becomes crucial to improve LTE system performance. In this paper, interference mitigation schemes for LTE downlink networks are investigated.
A fuzzy congestion controller to detect and balance congestion in wsnijwmn
This document proposes a fuzzy logic-based approach to detect and control congestion in wireless sensor networks (WSNs). The approach divides the WSN into grids monitored by designated Monitor Nodes. These nodes use fuzzy logic and three input metrics (transmission delay, grid density, dropped packets) to determine the congestion level of their grid. Based on the congestion level, packets are either forwarded through the grid or through alternative relay nodes to avoid congestion. Simulation results show this approach achieves higher packet delivery and lower packet loss compared to an existing baseline approach.
System level simulation for two tier macro femto cellular networksijwmn
LTE is an emerging wireless communication technology to provide high- speed data service for the mobile
phones and data terminals. To improve indoor coverage and capacity Femtocells are included in 3GPP
since Release 8. There is no common simulation platform is available for performance justification of LTEFemtocells.
LTE-Sim is an object-oriented open source simulator which incorporates a complete protocol
stack can be used for simulating two-tier macro-femto scenarios. To the best of our knowledge no paper
provides the guideline to perform system level simulation of Femtocell networks. Here, in this paper
Femtocells performance is evaluated in multi-Macrocells and multi-Femtocells environment with
interference from Microcells and Macrocell users along with the scripting.
Energy balanced on demand clustering algorithm based on leach-cijwmn
The proposed algorithm aims to improve energy efficiency in wireless sensor networks. It uses a centralized k-means clustering algorithm to form clusters based on minimizing total energy. The base station calculates relevant information for each node, including total network energy, distance to neighbor nodes, and cluster assignment. Nodes then use this information to probabilistically elect cluster heads within each cluster in a distributed manner. The algorithm considers both energy levels and communication distances to select optimal cluster heads. Simulation results show the proposed algorithm outperforms LEACH-C in network lifetime, stability period, and energy efficiency.
In ad hoc networks, routing plays a pertinent role. Deploying the appropriate routing protocol is very important in order to achieve best routing performance and reliability. Equally important is the mobility model that is used in the routing protocol. Various mobility models are available and each can have different impact on the performance of the routing protocol. In this paper, we focus on this issue by examining how the routing protocol, Optimized Link State Routing protocol, behaves as the mobility model is varied. For this, three random mobility models, viz., random waypoint, random walk and random direction are considered. The performance metrics used for assessment of Optimized Link State Routing protocol are throughput, end-to-end delay and packet delivery ratio.
L shaped slot loaded semicircular patch antenna for wideband operation ijwmn
This document summarizes a research paper that analyzes a dual-band semicircular microstrip patch antenna loaded with an L-shaped slot. Introducing the L-shaped slot creates two resonant frequencies for wideband operation. Parametric studies using MATLAB and HFSS simulation software show that the slot dimensions affect the lower resonance frequency more than the upper frequency, while the notch dimensions have more impact on the upper frequency. Radiation patterns are presented for both resonance frequencies, demonstrating dual-band behavior. The proposed antenna design achieves size reduction compared to other techniques for obtaining multiple bands in microstrip antennas.
ENERGY EFFICIENT GRID AND TREE BASED ROUTING PROTOCOLijwmn
In Wireless Sensor Network, a large number of sensor nodes are deployed and they mainly consume energy
in transmitting data over long distances. Sensor nodes are battery powered and their energy is restricted.
Since the location of the sink is remote, considerable energy would be consumed if each node directly
transmits data to the base station. Aggregating data at the intermediate nodes and transmitting using multihops
aids in reducing energy consumption to a great extent. This paper proposes a hybrid protocol
“Energy efficient Grid and Tree based routing protocol” (EGT) in which the sensing area is divided into
grids. The nodes in the grid relay data to the cell leader which aggregates the data and transmits to the
sink using the constructed hop tree. Simulation results show that EGT performs better than LEACH.
B ENCHMARKING OF C ELL T HROUGHPUT U SING P ROPORTIONAL F AIR S CHEDULE...ijwmn
The proportional fair (PF) scheduling algorithm com
promises between cell throughput and fairness. Many
research findings have been published by various re
searchers about PF algorithm based on mathematical
model and simulations. In this paper we have taken
the practical route to analyse the algorithm based
on
three types of subscription. In this benchmarking s
tudy, the user subscriptions are differentiated as
Gold,
Silver and Bronze schemes and they are provisioned
with certain throughputs. Apart from subscriptions
plans, the channel condition also plays a major rol
e in determining the throughput. So in order to ens
ure
fairness among different subscriptions even in the
bad channel conditions and to deliver the provision
ed
throughputs certain priorities are attached with th
e subscriptions. As per the subscription plans Gold
subscribers are assigned with 50% of the speed offe
red by the network as maximum based on CAT3 speed
(100 Mbps in DL and 50 Mbps in UL), Silver is assig
ned with 25% of the max speed and Bronze is
assigned with 12% of the max speed. The priorities
assigned to subscribers determines the fairness in
the
unfavourable channel conditions - Bronze (high), Si
lver and Gold (medium). In this paper, an
benchmarking tests have been performed with all of
three types of subscribers for nearly two hours in
the
live single cell network without any heterogeneous
cells influencing it. Furthermore, the results are
compared with the simulation results.
Effective Road Model for Congestion Control in VANETSijwmn
Congestion on the roads is a key problem to deal with, which wastes valuable time.. Due to high mobility
rate and relative speed link failure occur very often. VANET is used to tackle the problem of congestion,
and make decisions well in advance to avoid traffic congestion. In this paper we proposed a solution to
detect and control the traffic congestion by using of both (V2V) and (V2I), as a result the drivers become
aware of the location of congestion as well as way to avoid getting stuck in congestion. The congestion is
detected by analyzing the data obtained by vehicular communication and road side units to avoid the
traffic. Our proposition system is competent of detecting and controlling traffic congestion in real-time.
V2V and V2I communication network is used to receive and send the messages. We simulate the result by
using Congestion Detection and Control Algorithm (CDCA), and show that this is one effective way to
control congestion. The Proposed methodology ensures reliable and timely delivery of messages to know
about congestion and avoid it.
AN ADVANCED QOS ANALYSIS AND EVALUATION METHOD FOR MOBILE INTERNET ACCESS ijwmn
The paper proposes a new method for the analysis and evaluation of the Quality of Service (QoS) in a
mobile Internet access scenario. In particular, the paper proposes a throughput evaluation method based
on PathChirp algorithm. The end-to-end bandwidth was estimated by means of the Self Loading of Periodic
Streams (SloPS) technique. The obtained measurements were then analyzed by estimating the degree of
correlation with other parameters that characterize the data transmission such as power, round trip time,
etc. Finally, in order to have greater spatial resolution performance guaranteed by an Internet service
provider, a 3D reconstruction method based on using drones is proposed and some preliminary results are
discussed.
A SEMI BLIND CHANNEL ESTIMATION METHOD BASED ON HYBRID NEURAL NETWORKS FOR UP...ijwmn
The paper describes how to improve channel estimation in Single Carrier Frequency Division Multiple
Access (SC-FDMA) system, using a Hybrid Artificial Neural Networks (HANN). The 3rd Generation
Partnership Project (3GPP) standards for uplink Long Term Evolution Advanced (LTE-A) uses pilot based
channel estimation technique. This kind of channel estimation method suffers from a considerable loss
ofbitrate due to pilot insertion; all data frame sent contains reference signal. The HANN converts data
aided channel estimator to semi blind channel estimator. To increase convergence speed, HANN uses some
channel propagation Fuzzy Rules to initialize Neural Network parameters before learning instead of a
random initialization, so its learning phase ismore rapidly compared to classic ANN.HANN allows more
bandwidth efficient and less complexity. Simulation results show that HANN has better computational
efficiency than the Minimum Mean Square Error (MMSE) estimator and has faster convergence than
classic Neural Networks estimators.
Connectivity aware and adaptive multipath routing algorithm for mobile adhoc ...ijwmn
We propose in this paper a connectivity-aware routing algorithm and a set of related theorems. This algorithm allows nodes in Mobile Adhoc and Sensor Networks (MASNets) to provide the highest connectivity life time to a specific destination since the issuance of data becomes a necessity for MASNets. In the proposed Solution, nodes in MASNets are able to specify the disjointness degree of the available paths allowing the discovery of the optimal set of backup routes and consequently enhance the survivability of the connectivity. These nodes perform an on-demand discovery and a generation of a set of routes, by specifying a disjointness threshold, representing the maximal number of nodes shared between any two paths in the set of k established paths. The proposed multipath routing algorithm, is adaptive, secure, and uses labels to carry the disjointness-threshold between nodes during the route discovery. A set of security mechanisms, based on the Watchdog and the digital signature concepts, is used to protect the route discovery process.
SENSOR SELECTION SCHEME IN TEMPERATURE WIRELESS SENSOR NETWORKijwmn
In this paper, we propose a novel energy efficient environment monitoring scheme for wireless sensor
networks, based on data mining formulation. The proposed adapting routing scheme for sensors for
achieving energy efficiency from temperature wireless sensor network data set. The experimental
validation of the proposed approach using publicly available Intel Berkeley lab Wireless Sensor Network
dataset shows that it is possible to achieve energy efficient environment monitoring for wireless sensor
networks, with a trade-off between accuracy and life time extension factor of sensors, using the proposed
approach.
Unmanned aerial vehicles (UAVs) have become very popular recently for both civil uses and potential commercial uses, such as law enforcement, crop survey, grocery delivery, and photographing, although they were mainly used for military purposes before. Researchers need the help of simulations when they design and test new protocols for UAV networks because simulations can be done for a network of a size
that a test bed can hardly approach. In the simulation of an UAV network it is important to choose a radio propagation model for the links in the network. We study the shadowing radio propagation model in this paper and compare it with the free space model, both of which are available in the ns2 network simulation package. We also show how the choice of the parameters of the shadowing model would impact on the
network performance of a UAV network.
Mobility is one of the basic features that define an ad hoc network, an asset that leaves the field free for the
nodes to move. The most important aspect of this kind of network turns into a great disadvantage when it
comes to commercial applications, take as an example: the automotive networks that allow communication
between a groups of vehicles. The ad hoc on-demand distance vector (AODV) routing protocol, designed
for mobile ad hoc networks, has two main functions. First, it enables route establishment between a source
and a destination node by initiating a route discovery process. Second, it maintains the active routes, which
means finding alternative routes in a case of a link failure and deleting routes when they are no longer
desired. In a highly mobile network those are demanding tasks to be performed efficiently and accurately.
In this paper, we focused in the first point to enhance the local decision of each node in the network by the
quantification of the mobility of their neighbours. Quantification is made around RSSI algorithm a well
known distance estimation method.
This document presents an adaptive steganography technique based on an enhanced cipher hiding method for secure data transfer. It combines cryptography and audio steganography. The secret message is first encrypted using a modified least significant bit algorithm and 2's complement operations. The encrypted data is then embedded into the least significant bits of an audio file. Keys are generated and sent with the stego audio to the receiver. The receiver uses the keys to extract the encrypted data from the audio and decrypt it back to the original message. The technique aims to provide better security for data transmission over unsecured networks by taking advantage of both cryptography and steganography.
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Feature Selection Algorithm for Supervised and Semisupervised ClusteringEditor IJCATR
This document reviews steganography techniques for hiding data in digital images. It discusses how the least significant bit insertion method can be used to embed secret messages in the pixel values of an image file without noticeably changing the image. The document also compares steganography to cryptography, noting that while cryptography encrypts messages, steganography aims to conceal even the existence of hidden communications. It proposes a novel approach that first encrypts data using cryptography before embedding it in images using least significant bit insertion and interpolation to increase capacity.
Steganography using Interpolation and LSB with Cryptography on Video Images-A...Editor IJCATR
Stegnography is the most common term used in the IT industry, which specifically means, "covered writing" and is derived
from the Greek language. Stegnography is defined as the art and science of invisible communication i.e. it hides the existence of the
communication between the sender and the receiver. In distinction to Cryptography, where the opponent is permitted to detect,
interrupt and alter messages without being able to breach definite security grounds guaranteed by the cryptosystem, the prime
objective of Stegnography is to conceal messages inside other risk-free messages in a manner that does not agree to any enemy to even
sense that there is any second message present. Nowadays, it is an emerging area which is used for secured data transmission over any
public medium such as internet. In this research a novel approach of image stegnography based on LSB (Least Significant Bit)
insertion and cryptography method for the lossless jpeg images has been projected. This paper is comprising an application which
ranks images in a users library on the basis of their appropriateness as cover objects for some facts. Here, the data is matched to an
image, so there is a less possibility of an invader being able to employ steganalysis to recuperate the data. Furthermore, the application
first encrypts the data by means of cryptography and message bits that are to be hidden are embedded into the image using Least
Significant Bits insertion technique. Moreover, interpolation is used to increase the density
This document summarizes text steganography methods. It begins with a brief history of steganography from ancient times to modern uses. It then discusses text steganography specifically, including format-based, linguistic, and random/statistical generation methods. Examples of text steganography techniques are provided, such as selective hiding, hiding using whitespace, and semantic hiding using synonyms. The basic mechanism of text steganography is outlined as concealing a secret message in cover text using an embedding algorithm, transmitting the stego-text, and extracting the secret message using a recovery algorithm and stego-key at the receiving end.
11.secure data transmission by using steganographyAlexander Decker
This document summarizes a research paper that proposes a system for secure data transmission using steganography and cryptography. The system encrypts secret data using elliptic curve cryptography before embedding it in unused fields of the TCP/IP header to create a covert channel. This allows for covert transmission of encrypted data over a communication channel in a way that is not detectable by third parties. The paper reviews related work on using network protocols for steganography and discusses applying the proposed system to applications like secure file transfers and network auditing.
This document discusses using steganography and cryptography together to securely transmit data over a network. It proposes hiding encrypted data in unused fields of TCP/IP packet headers, creating a covert channel. Specifically, the secret message would be encrypted, embedded into a carrier file like an image to create a "stego object." This object would then be divided into packets and hidden in the TCP sequence number, option fields, IP type of service, or identification fields before transmission. By encrypting the message and using steganography, the transmission would be secure and covert, avoiding detection by third parties.
Data Security Through Crypto-Stegano Systemsrinzindorjej
Unauthorized access and hacking are major issues for internet users, and numerous articles have been published on various approaches to solving this issue. This study proposes a novel method for encoding a hidden message within the text by combining text steganography and substitution cryptography. While steganography and cryptography can be used to protect data, neither is sufficient to provide better security as they can be broken by steganalysis and cryptoanalysis. Therefore, the terms "cryptography-stegano" should be combined for improved security. In this method, data is first encrypted using a substitution cryptography technique to produce the cypher text, which is then encrypted using text steganography to produce a more secure cypher text sent to the recipient. Contrary to popular belief, using image steganography and cryptographic methods is unnecessary for effective data encryption. The study shows that combining text steganography with cryptographic techniques is an excellent data security method. Additionally, other combinations, such as audio and video steganography, should also be considered for better security
A Secure Software Implementation of Nonlinear Advanced Encryption StandardIOSR Journals
This document summarizes a research paper on image steganography using a polynomial key for covert communications. It proposes a new steganographic encoding scheme that separates the color channels of bitmap images and hides messages randomly in the least significant bit of one color component where the other two components' colors equal the selected key. The secret message, cover image, and pseudorandom seed generated by a polynomial are inputs. Pixels where the red and green components match the key are identified, and the secret bits are randomly inserted in the blue component's least significant bit using the seed. Statistical analysis found no difference in quality between the original and stego image. The scheme aims to provide a covert communication method using open systems.
An ensemble model to detect packet length covert channelsIJECEIAES
Covert channel techniques have enriched the way to commit dangerous and unwatched attacks. They exploit ways that are not intended to convey information; therefore, traditional security measures cannot detect them. One class of covert channels that difficult to detect, mitigate, or eliminate is packet length covert channels. This class of covert channels takes advantage of packet length variations to convey covert information. Numerous research articles reflect the useful use of machine learning (ML) classification approaches to discover covert channels. Therefore, this study presented an efficient ensemble classification model to detect such types of attacks. The ensemble model consists of five machine learning algorithms representing the base classifiers. The base classifiers include naive Bayes (NB), decision tree (DT), support vector machine (SVM), k-nearest neighbor (KNN), and random forest (RF). Whereas, the logistic regression (LR) classifier was employed to aggregate the outputs of the base classifiers and thus to generate the ensemble classifier output. The results showed a good performance of our proposed ensemble classifier. It beats all single classification algorithms, with a 99.3% accuracy rate and negligible classification errors.
Securing sensitive and important information from intruders is a tedious task in the 21st century. In order to protect information different ciphering techniques has been used. Quantum Cryptography has taken a new path in the field of crypto systems where all the presently used crypto systems are classified as classical cryptography systems. Classical cryptography systems use mathematical formulas where quantum cryptography uses the principles of photon polarization and heisenberg uncertainty principle. As the south
asian region is developing rapidly in almost all the sectorsthe need of securing information has become a difficult task. Therefore, the need of starting extensive research on quantum cryptography for the south asian region to safeguard information from intruders has been the purpose of this study. Comparative study of the growth of the telecommunication sector in the south asian region and how quantum
cryptography could assist in securing information has been discussedas results.In the end, details of the need to research on quantum cryptography in the south asian region to overcome future predicted cyber threats are also discussed.
This document summarizes a research paper that proposes a novel two-layer security mechanism combining cryptography and steganography techniques. The paper begins with an introduction discussing security issues with traditional cryptography and steganography methods. It then reviews related work in the fields. The proposed approach encrypts a secret message using AES encryption, splits the cipher file into frames, and embeds the cipher text in video frames using DCT-based steganography. Experimental results show the proposed approach achieves higher PSNR quality measurements than an existing HLSB technique, indicating better quality of stego frames. In addition, the proposed approach does not change file sizes compared to another existing approach.
Quantum Cryptography Approach for Resolving Cyber Threatsijtsrd
The research work focused on the future of the internet security transaction without allowing unauthorized user from accessing the secret document. The system was implemented with python flask framework been the lightest micro framework. The quantum key distribution generator model used is the BB84. Users can create account one the sender and other receiver then peered together in single communication channel. The sender attach file and send it in an encrypted manner to be received by receiver on presenting the same quantum key used for encrypting it. Once the eavesdropper click the link of the protocol, an alarm is raised and the system quantum key is change instantly and committed into the database. The other application is the Quantum Simulator, this application is used for generating a simulation for a quantum cryptography. Madubuezi Christian Okoronkwo | Onwuzo J. C | Gregory E. Anichebe "Quantum Cryptography Approach for Resolving Cyber Threats" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-6 , October 2021, URL: https://www.ijtsrd.com/papers/ijtsrd46458.pdf Paper URL : https://www.ijtsrd.com/computer-science/artificial-intelligence/46458/quantum-cryptography-approach-for-resolving-cyber-threats/madubuezi-christian-okoronkwo
This document summarizes a research paper on using cryptography and steganography for data security. It discusses how both cryptography and steganography can be used to securely transmit confidential information, but combining them provides additional security. The document then provides background on cryptography and steganography techniques. It explains symmetric and asymmetric encryption, and algorithms like AES, DES, and Diffie-Hellman. It also discusses how the paper aims to develop a new system that embeds encrypted data using steganography for enhanced security. In under 3 sentences.
Steganography is a technique for hiding secret information within ordinary digital files so that the very existence of the hidden information is concealed. It works by replacing bits of redundant data within image, audio, or video files with bits of the secret message. This allows secure communication of hidden information in a way that avoids detection. The document discusses the history and benefits of steganography, providing examples of its use throughout history for covert communication. It also introduces some key concepts and terminology used in modern steganography.
Enhancement of Data Hiding Capacity in Audio SteganographyIOSR Journals
This document discusses enhancing data hiding capacity in audio steganography. It begins by introducing steganography and its use of hiding secret information in carrier files like images, audio and video. Specifically for audio steganography, it hides data in the least significant bits of audio files. The document proposes a method to enhance capacity by using the last 4 least significant bits instead of just 1, allowing more data to be hidden. It describes the basic process of audio steganography including embedding a secret message into an audio file using a key, and then extracting the message from the stego file at the receiving end.
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...ijiert bestjournal
The document discusses applying data hiding in audio-video files using anti-forensics techniques for authentication and data security. It proposes using steganography, which is hiding secret information in carrier files like audio and video, combined with anti-forensics techniques. The system would hide encrypted data in the least significant bits of frames in audio-video files. Parameters like PSNR and histograms would be analyzed at the transmitter and receiver ends to authenticate the data and ensure security. Common steganography algorithms like LSB and AES encryption would be used. The system aims to provide a more secure way of transferring data between client and server compared to traditional passwords or encryption alone.
This document summarizes a research paper on applying steganography techniques for data security. Specifically, it hides encrypted messages within digital images using the dynamic cell spreading technique (DCS) and the RC4 encryption algorithm. The document discusses DCS and RC4 in detail and evaluates the success of hiding encrypted messages in several test images without noticeable quality degradation. It concludes that DCS combined with RC4 encryption provides an effective method for hidden communication and data security.
This document summarizes a presentation on steganography and cryptography. It defines steganography as hiding data within a cover file like an image or audio file. The basic steganography model is described as having an encoder that hides a secret message within a cover file using a key, and a decoder that extracts the message from the stego object. Different types of steganography are outlined including image, text, audio, and network steganography. Cryptography is also introduced as a way to further secure communications. The objectives are to provide secret communication and the conclusion discusses combining steganography and cryptography for greater security.
This document summarizes an academic paper on audio steganography techniques using discrete wavelet transformation (DWT) and discrete cosine transformation (DCT). It begins with an abstract of the paper and an introduction to steganography. It then covers classifications of steganography, advantages and disadvantages of audio steganography, applications, and requirements of efficient steganography techniques. Finally, it discusses features of the human auditory system important for audio steganography and describes various audio steganography techniques in both the time and frequency domains.
Similar to A novel approach for hiding data in (20)
Introduction- e - waste – definition - sources of e-waste– hazardous substances in e-waste - effects of e-waste on environment and human health- need for e-waste management– e-waste handling rules - waste minimization techniques for managing e-waste – recycling of e-waste - disposal treatment methods of e- waste – mechanism of extraction of precious metal from leaching solution-global Scenario of E-waste – E-waste in India- case studies.
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...IJECEIAES
Climate change's impact on the planet forced the United Nations and governments to promote green energies and electric transportation. The deployments of photovoltaic (PV) and electric vehicle (EV) systems gained stronger momentum due to their numerous advantages over fossil fuel types. The advantages go beyond sustainability to reach financial support and stability. The work in this paper introduces the hybrid system between PV and EV to support industrial and commercial plants. This paper covers the theoretical framework of the proposed hybrid system including the required equation to complete the cost analysis when PV and EV are present. In addition, the proposed design diagram which sets the priorities and requirements of the system is presented. The proposed approach allows setup to advance their power stability, especially during power outages. The presented information supports researchers and plant owners to complete the necessary analysis while promoting the deployment of clean energy. The result of a case study that represents a dairy milk farmer supports the theoretical works and highlights its advanced benefits to existing plants. The short return on investment of the proposed approach supports the paper's novelty approach for the sustainable electrical system. In addition, the proposed system allows for an isolated power setup without the need for a transmission line which enhances the safety of the electrical network
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...IJECEIAES
Medical image analysis has witnessed significant advancements with deep learning techniques. In the domain of brain tumor segmentation, the ability to
precisely delineate tumor boundaries from magnetic resonance imaging (MRI)
scans holds profound implications for diagnosis. This study presents an ensemble convolutional neural network (CNN) with transfer learning, integrating
the state-of-the-art Deeplabv3+ architecture with the ResNet18 backbone. The
model is rigorously trained and evaluated, exhibiting remarkable performance
metrics, including an impressive global accuracy of 99.286%, a high-class accuracy of 82.191%, a mean intersection over union (IoU) of 79.900%, a weighted
IoU of 98.620%, and a Boundary F1 (BF) score of 83.303%. Notably, a detailed comparative analysis with existing methods showcases the superiority of
our proposed model. These findings underscore the model’s competence in precise brain tumor localization, underscoring its potential to revolutionize medical
image analysis and enhance healthcare outcomes. This research paves the way
for future exploration and optimization of advanced CNN models in medical
imaging, emphasizing addressing false positives and resource efficiency.
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Sinan KOZAK
Sinan from the Delivery Hero mobile infrastructure engineering team shares a deep dive into performance acceleration with Gradle build cache optimizations. Sinan shares their journey into solving complex build-cache problems that affect Gradle builds. By understanding the challenges and solutions found in our journey, we aim to demonstrate the possibilities for faster builds. The case study reveals how overlapping outputs and cache misconfigurations led to significant increases in build times, especially as the project scaled up with numerous modules using Paparazzi tests. The journey from diagnosing to defeating cache issues offers invaluable lessons on maintaining cache integrity without sacrificing functionality.
The CBC machine is a common diagnostic tool used by doctors to measure a patient's red blood cell count, white blood cell count and platelet count. The machine uses a small sample of the patient's blood, which is then placed into special tubes and analyzed. The results of the analysis are then displayed on a screen for the doctor to review. The CBC machine is an important tool for diagnosing various conditions, such as anemia, infection and leukemia. It can also help to monitor a patient's response to treatment.
Advanced control scheme of doubly fed induction generator for wind turbine us...IJECEIAES
This paper describes a speed control device for generating electrical energy on an electricity network based on the doubly fed induction generator (DFIG) used for wind power conversion systems. At first, a double-fed induction generator model was constructed. A control law is formulated to govern the flow of energy between the stator of a DFIG and the energy network using three types of controllers: proportional integral (PI), sliding mode controller (SMC) and second order sliding mode controller (SOSMC). Their different results in terms of power reference tracking, reaction to unexpected speed fluctuations, sensitivity to perturbations, and resilience against machine parameter alterations are compared. MATLAB/Simulink was used to conduct the simulations for the preceding study. Multiple simulations have shown very satisfying results, and the investigations demonstrate the efficacy and power-enhancing capabilities of the suggested control system.
Software Engineering and Project Management - Introduction, Modeling Concepts...Prakhyath Rai
Introduction, Modeling Concepts and Class Modeling: What is Object orientation? What is OO development? OO Themes; Evidence for usefulness of OO development; OO modeling history. Modeling
as Design technique: Modeling, abstraction, The Three models. Class Modeling: Object and Class Concept, Link and associations concepts, Generalization and Inheritance, A sample class model, Navigation of class models, and UML diagrams
Building the Analysis Models: Requirement Analysis, Analysis Model Approaches, Data modeling Concepts, Object Oriented Analysis, Scenario-Based Modeling, Flow-Oriented Modeling, class Based Modeling, Creating a Behavioral Model.
Software Engineering and Project Management - Introduction, Modeling Concepts...
A novel approach for hiding data in
1. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 7, No. 4, August 2015
DOI : 10.5121/ijwmn.2015.7404 49
A NOVEL APPROACH FOR HIDING DATA IN
VIDEOS USING NETWORK
STEGANOGRAPHY METHODS
Amritha Sekhar1
, Manoj Kumar G.2
& Prof. (Dr.) M. Abdul Rahiman3
1
Department of Computer Science & Engineering, University of Kerala, India
2
Department of Computer Science & Engineering, University of Kerala, India
3
Pro Vice Chancellor, Kerala Technological University, India
ABSTRACT
Steganography is a technology used since years for the communication of messages secretly. These
secret messages are put inside honest carriers. Carriers can be digital images, audio files, video files
and so on. The limitation in sending concealed longer messages has been overcoming by the inclusion
of video files as carriers. Popular internet services such as Skype, BitTorrent, Google Suggest, and
WLANs are targets of information hiding techniques. Nowadays, plotters are not only using the
carriers but also the protocols for communication that regulate the path of the carrier through the
Internet. This technique is named Network Steganography.
KEYWORDS
Protocol Steganography, Network Steganography, Cryptography
1. INTRODUCTION
The term Steganography originates from the ancient Greek words steganos − covered,
concealed or protected and graphein − writing. Likewise, the term cryptography originates
from kryptos − hidden or secret and graphein [1]. Steganography and cryptography can be
applied in combination; both are orthogonal [2]. Both the terms have closer meaning. But both
need to be considered as different techniques for hiding information.
Network steganography is a fast developing field and immature branch of information hiding
[3]. Krzysztof Szczypiorski at Warsaw University of Technology introduced network
steganography and a steganographic method for wireless local area networks (WLANs) -
Hidden Communication System for Corrupted Networks, HICCUPS. The gist of network
steganography is the exploitation of Open System Interconnection Reference Model (OSI RM)
protocols. Wojciech Mazurczyk and Krzysztof Szczypiorski published the first paper about
network steganography in Internet Protocol telephony, introducing the concept of Lost Audio
Packet Steganography, LACK.
2. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 7, No. 4, August 2015
50
The classification of network steganography methods can be based on the protocol
functions associated with the OSI RM layers. These methods utilize one or more protocols
simultaneously. The steganographic method that utilizes single network protocol is termed Intra-
protocol network steganography and the one which utilizes more than one network protocol is
termed Inter-protocol network steganography [1]. Padding Steganography (PadSteg) is one of the
inter-protocol steganographic methods.
The classification of intra-protocol network steganographic methods is based on the type of
modification of Protocol Data Unit (PDU) and modification of time- relations between
PDUs. There exists methods which encompass the modification of PDUs as well as the
modification of time-relations between PDUs, such methods are considered ”hybrid” [10] e.g.
LACK, and Retransmission Steganography (RSTEG). Modification of PDUs includes either
modification of payload, modification of protocol specific fields (e.g. Wireless Padding
(WiPad), specific methods of Stream Control Transmission Protocol (SCTP)) or both (hybrid,
e.g. HICCUPS), while the modification of time-relations between PDUs includes either
reordering of the PDUs by SCTP multistreaming based methods, intentional losses of PDUs
or modification of inter-PDU time delay.
The information transfer over the internet is always vulnerable to attacks. Hackers or intruders
are always listening to the transmission channels to tap the information and make use of it.
Cryptographic algorithms always could protect information from such malicious users to a
greater extent. But encrypting the information, does not make it hidden. It becomes unreadable,
but it exists as data itself. This limitation is overcome by the introduction of Steganography.
Steganography is the act of concealing and thus protecting the information. It could hide the
existence of the information. The information can be made hidden in carriers. These carriers can
be text, audio, image, video files and protocol header fields.
Covert channel is the channel used in Steganography for the anonymous transfer of information.
It is not a planned channel, but is a carrier of the secret information. Covert channel has a critical
role in the area of information hiding or hidden communication. It allows the transmission of
information by an unauthorized process. Covert channel is designed in such a way that it is
hidden within the normal communication traffic of authorized logical channel. The violation of
the security policies of the network system is the basis for enabling hidden communication [16].
Numerous network protocols can be made a vehicle to carry out covert communication [17].
Covert channel is not an anticipated channel for the communication process. It makes use of the
bandwidth of other legitimate channels for the transmission of secret data. The application of
Steganography in network protocol headers also succeed in hiding the existence of the data rather
than making the data impossible to read. Packets act as the cover object in this scenario.
Information hiding methods have been using network protocol header fields as covert channels.
The term ‘Network Steganography’ was first introduced in 2003 by Krzysztof Szczypiorski[13].
The information hiding in TCP/IP protocols was illustrated by Craig Rowland [18]. Few fields in
the TCP header can be used for covert communication[20]. In this paper, we propose a new
method which uses the protocol header fields as covert carriers.
Section II of this paper discusses the evolution of Steganography. Section III discusses the recent
developments in the field of network steganography. Section IV discusses various network
steganography methods. Section V deals with the various TCP/IP header fields that can be made
use for covert communication.Section VI handles the proposed system to carry out covert
communication using a new method. Section VII discusses the implementation method of the new
system and section VIII gives the ideas unleashed from the theoretical analysis of the algorithm
used for encryption. Section IX briefs the future possible applications and Section X concludes
the discussion.
3. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 7, No. 4, August 2015
51
2. EVOLUTION OF STEGANOGRAPHY
Steganography, meaning hidden writing, has been used to mask secret messages. In olden days,
physical or ordinary objects were selected as carriers for hidden information [9]. The first written
report of the Steganography use is imputed to the Greek historian Herodotus. It involved
disguising the secret message within a hare corpse. The physical object or the carrier had to be
shifted from one communication party to the other without arising any hunch.
Histiaeus tattooed secret message on the shaved head of his slave and waited for the hair to grow.
The slave is sent to the intended receiver and the head was shaved off to read the message.
Another noteworthy method used is the use of wooden tablets for the communication of secret
messages [3], [9]. These were coated with a layer of wax. The woods were the carrier of the
stenograms. Only the cognizant receiver would be able to read the message by removing the wax
coated. Pliny the Elder invented the sympathetic ink or invisible ink which is nothing but the milk
of the tithymalus plant. The messages written by this ink would appear only when it is heated.
Other steganographic methods used in ancient days include Cardano Grille − a stiff sheet
perforated with rectangular holes, Vexierbild − picture puzzle, Eggs, Beer barrel − by smuggling
messages inside the stopper, Musical notes − each note corresponds to a letter, Newspaper code −
by punching holes above letters, combination of invisible ink and musical notes and Microdots −
by shriveling text down to a dot [3], [9]. In the 1980s, user identities were encoded in the spaces
between words, termed watermarking. Today’s stegano- graphic methods make use of computers
and networks. The most popular trends in digital steganography are digital media Steganography,
linguistic Steganography and network Steganography [9]. Digital media steganography includes
image Steganography, video Steganography and streaming Steganography. Alongside these, the
one target of increased interest is the network steganography.
3. RECENT DEVELOPMENTS
Recent information hiding solutions exploit popular P2P services like Skype, P2P file
sharing systems like BitTorrent, search features like Google Suggest, multimedia and real-time
services like IP telephony, new network protocols like SCTP, wireless network environments
and many more [2].
Steganographers exploit services if it has large volume of traffic that can be altered to bring forth
a covert channel (e.g. IP telephony). Transcoding Steganography (TranSteg) is a steganographic
method which targets IP telephony services. Another steganographic method, Skype Hide
(SkyDe) targets P2P services like Skype. A steganographic method has been introduced for P2P
file sharing services, StegTorrent. The StegSuggest steganographic method targets the
feature, Google Suggest.
Wireless networks are very popular, dynamically evolving network steganography sub-field.
Information hiding tech- niques target wireless networks also. WiPad, a stegano- graphic method
for WLANs, was introduced by Mazurczyk and Szczypiorski.
4. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 7, No. 4, August 2015
52
4. NETWORK STEGANOGRAPHY METHODS
The following are the existing network steganograhic methods.
4.1. HICCUPS
HICCUPS stands for Hidden Communication System for Corrupted Networks. It is the
steganographic system ded- icated to shared medium networks including WLANs. The freshness
of HICCUPS is the use of procure communications network fortified with cryptographic
mechanisms to provide steganographic system and proposal of a new protocol with bandwidth
allocation based on corrupted frames [13]. It is a steganographic system for hidden group with
common knowledge. A station sends a corrupted frame, i.e., a frame with an incorrect checksum.
Remaining hidden stations change their mode of operation to the corrupted frame mode. To
transmit steganograms, HICCUPS replaces payload of intentionally corrupted frames at the
transmitter [10].
4.2. LACK
LACK stands for Lost Audio Packet Steganography. It is the steganographic method which
targets IP telephony. There exists a fact that in typical multimedia communication protocols (e.g.
Real-time Transport Protocol (RTP)), overly detained packets are not used by the receiver to
rebuild the transmitted data. Those packets are reckoned useless and did cast away [14]. To
transmit steganograms, LACK replaces payload of intentionally delayed voice packets at the
transmitter. And those packets will be recognized as lost and dropped at the receiver [10].
The steps are:
• The voice packets stream is generated at the transmitter.
• One of the voice packets is chosen to be intentionally delayed.
• Chosen voice packet’s payload is replaced with steganogram and it is delayed.
• After the delay timer expires, delayed voice packet is sent to the receiver.
• Usual receiver treats excessively delayed voice packet as lost and it drops such packet.
LACK-aware receiver extracts steganogram from delayed voice packet.
4.3. RSTEG
RSTEG stands for Retransmission Steganography. RSTEG is a new steganographic method
which is meant for a wide class of protocols that uses retransmission mechanisms. The main
novelty in RSTEG is that it does not acknowledge a packet which is received successfully,
thereby intentionally invoking its re-transmission. Instead of user data in the payload field, the
retransmitted packet carries a steganogram [12]. In RSTEG, to transmit steganograms, the
receiver intentionally does not acknowledge received packets to invoke retransmission. The
sender replaces the payload with the secret message which is recognized as a steganogram by the
receiver.
One possible detection method is statistical steganalysis based on the network retransmission rate.
RSTEG is very hard to detect, if it is used reasonably [10].
5. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 7, No. 4, August 2015
53
4.4. SCTP MULTISTREAMING-BASED METHOD
SCTP is Stream Control Transmission Protocol. SCTP improves by mixing components of TCP
and UDP. In this method, subsequent chunks are transmitted within streams determined
by bits of steganogram. Let the steganogram be 10011100 and let there be 4 streams -
Stream 1, 2, 3 and 4 [10]. The steps are:
• Sender wants to transmit following hidden bits: 10011100.
• First two hidden bits are 10, so a chunk within stream 3 is sent.
• Next a chunk within stream 2 is sent in order to transmit bits 01.
• Then a chunk within stream 4 - bits 11.
• Finally a chunk within stream 1 - bits 00.
4.5. PADSTEG
PadSteg stands for Padding Steganography. It is the steganographic system for LANs. PadSteg is
known to be the first inter-protocol steganography solution. By the term inter-protocol, it means
the usage of relation between two or more protocols from the TCP/IP stack to enable secret
communication [10].
PadSteg replaces padding bits of the short Ethernet frames with steganograms. The known
Etherleak vulnerability makes PadSteg not trivial to detect. Etherleak is caused by ambiguous
standardization that makes implementation of padding mechanism vary. In result, some NIC
drivers handle frame padding incorrectly and fail to fill it with zeroes [4].
PadSteg utilizes Address Resolution Protocol (ARP) to identify all PadSteg-capable hidden
nodes and also to perform so called carrier-protocol hopping during hidden exchange.
Carrier-protocol hopping is an ability to negotiate carrier-protocol of the steganograms during
hidden communication.
PadSteg actually exchanges data with short frames of protocols such as Transmission Control
Protocol (TCP), ARP, User Datagram Protocol (UDP) and Internet Control Message Protocol
(ICMP).
4.6. TRANSTEG
TranSteg (Trancoding Steganography) is a middlingly new IP telephony steganographic method.
It functions by compressing open data to make space for the steganogram. This is achieved by
means of transcoding. It offers high steganographic bandwidth. TranSteg retains good voice
quality. It is harder to detect than any other VoIP steganographic methods that exist today. In
TranSteg, the hidden information is extracted and the speech data is practically restored to what
was originally sent, after the steganogram reaches the receiver. This is a brobdingnagian
advantage when TranSteg is compared with the existing VoIP steganographic methods. In all
other methods, hidden data can be extracted and removed, but the original data cannot be restored
because it was previously erased due to a hidden data insertion process [15].
TranSteg is intended for a broad class of multimedia and real-time applications e.g. IP
telephony. TranSteg can be exploited in other applications or services like video
streaming, wherever a possibility exists to efficiently compress the overt data. The typical
6. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 7, No. 4, August 2015
54
approach to steganography is to compress the covert data in order to limit its size, because it
is reasonable in the context of a limited steganographic bandwidth [10]. TranSteg utilizes
compression of the overt data to make space for the steganogram. TranSteg for IP telephony is
using transcoding of the voice data from a higher bit rate codec - overt codec to a lower bit rate
codec - covert codec with the least possible degradation in voice quality.
TranSteg operates as follows:
• For a chosen RTP voice stream, find a codec that will result in a similar voice
quality but smaller voice payload size than the originally selected.
• Then, transcode the voice stream.
• At this step, the original voice payload size is intentionally unaltered and the change of
the codec is not indicated.
• Instead, after placing the transcoded voice payload, the remaining free space is filled with
hidden data.
If Secure Real-time Transport Protocol (SRTP) is utilized for RTP streams, TranSteg
detection is very difficult to perform.
4.7. SKYDE
SkyDe stands for Skype Hide which is a new steganographic method. SkyDe uses Skype-
encrypted silent packets to provide means for secret communication. Skype does use any silence
suppression mechanism. Therefore, it is possible to reprocess those packets that have no voice
signal, for steganographic purposes. SkyDe experiments prove that the method is viable. Also,
results show that SkyDe offers high steganographic bandwidth.
Voice over IP (VoIP) or IP telephony is a real-time service. It enables users to make phone calls
through data networks that use an IP protocol. One of the most popular of the IP telephony
systems is Skype. It is a proprietary P2P telephony service. Skype is owned by Microsoft [5].
Because of Skype traffic encryption, SkyDe can replace the encrypted silence with encrypted
secret data. This makes SkyDe hard to detect. Packets with silence have low impact on Skype
conversation quality. To provide undetectability and low voice quality distortion SkyDe that
utilizes 30% of all packets with silence is advised [10]. This gives almost 2 kbits steganographic
bandwidth.
4.8. STEGTORRENT
StegTorrent is a new network steganographic method. It is intended for the popular P2P file
transfer service - BitTorrent. StegTorrent is developed for encoding classified data or
information in transactions via BitTorrent. It works on the basis of reordering data packets in
the peer to peer data exchange protocol. Some of the existing steganographic methods also
reorder packets, but they need synchronization. StegTorrent doesn’t.
BitTorrent is a P2P file sharing system that allows its users to distribute large amounts of data
over IP networks [6]. A BitTorrent user shares a file or part of a file with so many recipients at
once. This is the advantage taken up by StegTorrent. [7].
In the clandestine communication scenario, both the secret data senders and receivers are in
control of a number of BitTorrent clients and their IP addresses are known to each other. It is not
7. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 7, No. 4, August 2015
55
at all necessary to have any knowledge about the topology of the network. The hidden data sender
uses the modified BitTorrent client, i.e., the StegTorrent client. This client then shares a resource
downloaded by another StegTorrent client. And that consists of a controlled group of BitTorrent
clients [6].
4.9. STEGSUGGEST
StegSuggest is the steganography method that targets Google Suggest. Google Suggest service’s
suggestions within Google search are utilized as a hidden data carrier.
Google Suggest was created to aid a user bump the right phrase by suggesting and completing
popular phrases automatically while typing. StegSuggest is another approach to attack Google
searches. Google Suggest is based on Asynchronous JavaScript and XML (Ajax) technology. It
brings up a list of 10 most popular related search phrases as the user types. It integrates Document
Object Model (DOM), HTML/XHTML, Cascading Style Sheets (CSS), Extensible Markup
Language (XML), JavaScript etc. Web applications that uses Ajax can retrieve data from the
server asynchronously. This retrieval will neither disrupt the display nor behavior of the page
which is loaded currently.
One attack intercepts the suggestions from Google server. It adds a word to the end of each of the
suggested phrases [11]. The hidden receiver extracts these appended words and then converts it
into a meaning message with the aid of a pre-shared lookup table.
Google Suggest uses HTTP and TCP protocols. Both of them have been used for exchanging
web pages. StegSuggest works as follows:
When user begins typing a search phrase into the search field, once in a while, these
characters are sent to the Google server in HTTP GET message [8]. Google server returns a list
of the most popular search phrases in HTTP OK message. The list is then presented to the user in
a drop-down list. While the user is typing, HTTP GET messages are sent frequently. This means
that during search for particular phrase, numerous HTTP messages will be exchanged. Each
HTTP request may carry at least one or more characters of the search phrase.
5. USING NETWORK FIELDS
Fig. 1 shows the TCP header. The Options field is used to provide additional functionality or
optional parameters that may be used by the sender or the receiver, whereas the 32 bit Sequence
number field is used to identify the current position of the data byte in the segment.
Figure 1. TCP Header.
8. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 7, No. 4, August 2015
56
Fig. 2 shows the IP header. In the IP header, the 8 bit ToS field is not used by many of the
network systems. The 16 bit ID field helps the receiver in reassembling the datagram fragments.
The value in the ID field is copied to all fragments when a fragmentation occurs. The Flag field
has 3 reserved bits – X (Reserved), DF (Do not Fragment) and MF (More Fragments). The use of
DF bit in covert communication requires prior knowledge about the MTU [18]. In [19], a method
of covert communication by manipulating the lower order bits of the TCP timestamp field has
been presented.
Figure 2. IP Header.
From the analysis made in [6], it is concluded that the use of most of these header fields in
carrying out network steganography, can be easily detected. Therefore, it is necessary to have
new systems that are capable for the effective transmission of secret information across the
network.
6. PROPOSED SYSTEM
We propose a new method which efficiently carries out steganography in network protocols using
PRNGs which minimizes the attacks and information recovery by intruders.
The system involves the sender, the receiver and the intruder trying to access the channel to
decode the information but fails in recovering them.
In this method, application of steganography on the header field of the network protocols involves
the use of a key generating function to generate keys to decode the secret information. It is
assumed that both Alice and Bob make use of the same generating function for the decoding
process. This is the critical part of the method, where the function and thereby the bit positions in
the header are priorly shared only between the communicating parties.
If we apply randomization on the generating function for keys, then the level of complexity for
extracting data from the headers will be increased and thereby process of retrieving the right
information again gets complicated due to the change in bit positions.
In addition, a concept of ‘fake key’ is also introduced in this method. Along with the actual data
and keys, fake keys are transmitted that are keys which could mislead one who gets access to the
transmission channel. If any eavesdrop in the transmission channel occurs, then it incurs greater
delay in time to meet the goal to identify and recover the exact information. The goal to achieve
minimum recovery by intruders and thereby countering attacks is met here. Since, the bit
positions of the actual key to decode the data is known only to the sender and the receiver, anyone
having the encoded information might be at a sea of keys – trying to identify the actual key to
decode.
9. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 7, No. 4, August 2015
57
7. IMPLEMENTATION METHOD
Consider a sender (Alice) and a receiver (Bob) intended to transmit and receive secret data
respectively by using the covert channels in TCP/IP headers. The secret message is encrypted and
is steganographically embedded in the video by Alice. The resultant stego object is again
encrypted followed by compression. The end file is embedded steganographically into the
network packet headers, thus generating a sequence of steganographic network packet sequence.
This sequence is sent over the computer network. Fig. 3 shows the process of encoding and
embedding by Alice.
Figure 3. Sender side processes of encoding and embedding
Upon receiving the sequence of steganographic packets from Alice, Bob starts extracting data
from the headers of the packets. Then, the data undergo decompression followed by the
decryption process. Now Bob has the video file with the encrypted secret message embedded in
it. Bob now carries out the desteganography process to desteg the encrypted secret message from
the video file. Following this, the secret message undergoes decryption again and thereby Bob
gets the original secret information. The final decryption step makes use of the key that Bob has
extracted from the protocol header fields.
Fig. 4 represents the process of decoding and extracting the crypto-steg data by Bob. Once the
data and key are successfully extracted from the header fields, the decompression and decryption
steps are followed respectively. The resulting Stego file is then encrypted using the key extracted
from the header fields and thus Bob obtains the original secret information.
It is to be noted that both Alice and Bob need to have agreed upon a common encryption and
compression algorithms for use during the communication process.
Figure 4. Receiver side processes of decoding and extracting
10. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 7, No. 4, August 2015
58
8. THEORITICAL ANALYSIS
From the analysis over an 1 Mbps link, the time for the transmission of say, 1 MB of information
by Alice is far less than the time it takes by an intruder to decode the same information, extracted
from the header fields. Thus, the practicality of the new method lies in the fact that by the time
the intruder decodes the message, numerous sequences of packets resulting in heavy bulks of data
would have been transmitted and received respectively by Alice and Bob. The entire method
involves two encryption phases in the transmission side and thus involves two decryption phases
in the reception side. The latter is the same if the data transmitted is tapped by the intruder.
TABLE I. TIME ANALYSIS
No. of
characters
Time Analysis (Time in ms)
Numbers Alphabets Alphanumeric
10
20
30
40
50
740.6539
742.0332
742.4247
742.8254
743.2308
743.6669
744.0288
744.3779
744.7556
745.1829
746.0217
746.5179
746.9502
747.4468
747.9269
Average of
each kind
of input
742.2336 744.4024 746.9727
Average 744.5362
For instance, let the Blowfish encryption algorithm, one of the most efficient cryptographic
algorithms in use[7], be agreed by Alice and Bob prior to the transmission[21]. As an initial step,
in order to arrive at the complexity in time it takes for different – numbers, alphabets and
alphanumeric – and for varying number of inputs – 10, 20, 30, 40 and 50 characters, the Blowfish
algorithm has been analyzed. Table 1 shows the analysis made based on time for each kind of
input.
Figure 5. Encryption time for numbers.
The time is measured in ms. It is seen that Blowfish algorithm takes on an average equal amount
of time for the encryption process for varying set of characters and for different kind of input
data. Fig. 5, 6, and 7 shows the graphical representation of the analysis done on time for different
and varying number of inputs.
11. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 7, No. 4, August 2015
59
Figure 6. Encryption time for alphabets.
The most important point to be noticed here at this step is that, as in the case of the encryption
process at the sender side which takes time in the order of ms, all the steps that follow would also
be processed within a short period of time and the information will be sent, received and decoded
by the receiver in the same order of time.
What distinguishes this method from the existing ones is that, the decoding complexity involved
in the entire process because of the presence of fake keys which would mislead the intruder, the
intruder wouldn’t get enough time to decode the packet sequences.
Figure 7. Encryption time for alphanumeric inputs.
Though the intruders could decode a fraction of the packet sequences, they would not be able to
make the correct order of the packets.
9. FUTURE APPLICATIONS
Network Steganography has a lot of future applications for malicious software. The application of
the aforementioned network steganographic methods leads to more sophisticated malware. The
covertness of malevolent programs on smart phones can be increased in the future. This
possibility is dra- matically doubled in smart phones because the multimedia capability lets to
create and use a video range of carriers e.g. audio, video, images or Quick-Response (QR) codes.
Another reason is the availability of a full featured TCP/IP stack. It gives the possibility to
interact with desktop-class services, thereby completely utilizing all the already available network
methods for computing devices. Also, covert channels can be made exploitable based on VoIP
and P2P, since the plethora of the adopted OS allows developing sophisticated applications.
Network Steganography has been emerging into new and new domains. The stealthiness of illegal
data exchange can be increased. Network Steganography can have tremendous influence to
industrial espionage when it comes to data leakage.
12. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 7, No. 4, August 2015
60
10. CONCLUSIONS
Network Steganographic methods are getting more sophisticated. They are becoming harder to
detect. New and new data carriers could be developed. It must be highlighted that as new and
popular steganographic methods evolve, the data traffic of genuine internet users will also be
utilized by network steganograhers. The network steganography threat can affect all internet
users. This would lead to legal as well as ethical problems. Recently, there has been a significant
increase in the development and application of network steganographic methods for malicious
purposes. This in turn has increased the qualities, capabilities and covertness of the network
steganography. Network steganography would be applied in an increasing manner in each and
every future malware or malicious activities. But, there lacks effective countermeasures.
Therefore, an additional research is a critical need in the field of network steganography which
would formulate universal countermeasures[22].
Network steganography is the art of concealing information inside protocol headers i.e., the secret
information is made hidden in the unused fields of headers of the protocols such as TCP/IP. The
need for secure hidden communication welcomes new and new reliable methods using which the
purpose can be fulfilled. Though several methods have been introduced in this area of security,
some of them fail to meet the goal, while others pave a way for the effective communication of
the covert information. In this method, by the introduction of time as the critical factor, we
succeed in achieving an extended security by reducing the effect of malicious attacks and thereby
the recovery of the hidden information becomes more or less infeasible.
ACKNOWLEDGEMENTS
The author would like to thank her guide, Mr. Manoj Kumar G., Associate Professor, LBS
Institute of Technology for Women, Thiruvananthapuram who encouraged her throughout the
preparation of this paper.
REFERENCES
[1] J. Lubacz, W. Mazurczyk and K. Szczypiorski, Principles and Overview of Network
Steganography, IEEE Communications Maga- zine, vol. 52, no.5, May 2014.
[2] S. Wendzel, W. Mazurczyk, L. Caviglione and M. Meier, Hidden and Uncontrolled - On the
Emergence of Network Steganography Threats, ISSE, Brussels, Belgium, 2014.
[3] E. Zieliska, W. Mazurczyk and K. Szczypiorski, Trends in Steganogra- phy, In: Communications of
the ACM, 57(2), pp. 86-95, March 2014.
[4] B. Jankowski, W. Mazurczyk, K. Szczypiorski, PadSteg: Introducing inter-protocol steganography,
In: Telecommunication Systems: Mod- elling, Analysis, Design and Management, Vol. 52, Iss. 2, pp.
1101-1111, 2013.
[5] W. Mazurczyk, M. Kara, K. Szczypiorski, SkyDe: a Skype-based Steganographic Method, Int’l J.
Computers, Communications & Con- trol, 8(3), pp. 389-400, June 2013.
[6] P. Kopiczko, W. Mazurczyk and K. Szczypiorski, StegTorrent: a Steganographic Method for the P2P
File Sharing Service, IEEE Se- curity and Privacy Workshops, 2013.
[7] J. Lubacz, W. Mazurczyk and K. Szczypiorski, 4 New Ways to Smuggle Messages across the
Internet, IEEE Spectrum, 2013.
[8] P. Biaczak, W. Mazurczyk and K. Szczypiorski, Sending Hidden Data via Google Suggest, ICTSM,
2011, Prague, Czech Republic, pp. 121-131.
[9] J. Lubacz, W. Mazurczyk and K. Szczypiorski, Vice over IP, IEEE Spectrum, pp. 40-45, February
2010.
[10] URL: www.stegano.net
13. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 7, No. 4, August 2015
61
[11] URL:http://www.technologyreview.com/view/529071/the-growing- threat-of-network-based-
steganography/
[12] W. Mazurczyk, M. Smolarczyk and K. Szczypiorski, Retransmission steganography and its detection,
Soft Comput. 15(3): 505-515 (2011).
[13] K. Szczypiorski, HICCUPS: Hidden Communication System for Cor- rupted Networks, In Proc. of
The Tenth International Multi-Conference on Advanced Computer Systems ACS’2003, pp.31-40,
October 22-24, 2003 - Midzyzdroje, Poland.
[14] W. Mazurczyk, Lost audio packets steganography: the first practical evaluation, Security and
Communication Networks 5(12): 1394-1403, 2012.
[15] A. Janicki, W. Mazurczyk and K. Szczypiorski, Steganalysis of transcoding steganography,
Annales des Tlcommunications 69(7-8): 449-460,2014.
[16] R.M. Goudar, Pankaj Joshi, “Information Security through Steganography using TCP/IP Header
Fields”, Intl. Journal of Next Generation Computer Applications, vol.1, issue 4, Dec. 2012.
[17] S. Zander, G. Armitage and P. Branch, ”A survey of covert channels and countermeasures in
computer network protocols” IEEE communication surveys, 3rd Quarter 2007, vol. 9, no. 3, pp. 44-
57.
[18] C. Rowland. Covert Channels in the TCP/IP Protocol Suite. First Monday, Peer Reviewed Journal on
the Internet, 2(5), January 1997.
[19] J. Giffin, R. Greenstadt, P. Litwack, and R. Tibbetts, "Covert Messaging Through TCP Timestamps."
Massachusetts Institute of Technology - MIT, USA, 2002.
[20] S. J. Murdoch and S. Lewis. Embedding Covert Channels into TCP/IP. In Information Hiding: th
International Workshop, volume 3727 of LNCS, pages 247–261. Springer, 2005.
[21] Abdel-Karim Al Tamimi, Performance Analysis of Data Encryption Algorithms, aa7@wustl.edu.
[22] J. Lubacz, W. Mazurczyk, K. Szczypiorski, “Principles and Overview of Network Steganography”,
IEEE Communication Magazine, vol. 52, no. 5, May 2014
Authors
Ms. Amritha Sekhar,Post Graduate-Student, Department of Computer-Science and
Engineering from LBS-Institute of Technology for Women, Poojappura,
Thiruvananthapuram, University of Kerala, India.
Mr. Manoj Kumar G., Associate-Professor, Department of Computer-Science and
Engineering from LBS-Institute of Technology for Women, Poojappura,
Thiruvananthapuram, University of Kerala, India.
Prof. (Dr.) M. Abdul Rahiman, Pro Vice Chancellor, Kerala Technological University.