SEBS - Secure Emoticons Based Steganography

被引:0
|
作者
Rafat, Khan Farhan [1 ]
Hussain, Junaid [1 ]
机构
[1] NUST, Rawalpindi Islamabad, Pakistan
关键词
information security; information assurance; steganography; data privacy; secure communication information hiding; private texting; secret messages; security through obscurity; cryptography; encryption;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Be it a commercial or military undertaking, the decisive factor of one's success in the respective arena is to have uninterrupted operation-critical activities. On account of large scale reliance on information technology, affording maximum protection to data has become extremely essential to manage fluctuating business trends. By and large, Cryptographic Services are being employed to secure the data. Secure encryption, indeed, is a remedy against eavesdropping of sensitive information but its perceptibility - as something being gibberish - is sufficient enough to seek immediate attention of an onlooker which raises suspicion of some behind the scene activity. Hence, there felt a serious need to hide sensitive data in a manner such that its existence shall remain unknown to the unauthorized person. To address the perceptibility concern, various image based digital steganographic schemes have been introduced. However, it is observed that existing image-based digital steganographic schemes do not take into consideration the worst case scenario that the enemy can also have the possession of original cover. To overcome this shortcoming, this paper presents a novel steganographic scheme which is effective against known-cover attack. Furthermore, it provides greater cryptographic security by adhering to Kerckhoff's principal and successfully protects private or classified information, whether at rest or in transit. Our steganographic scheme provides a method to protect information by hiding it behind emoticons - a popular means of conversation in mobile communication and social media these days. A single emoticon in our scheme can conceal up to 8 bits of secret information. This scheme affords robustness via unique set of emoticons. We present twofold security via encryption and steganography. Hence, this scheme is most unlikely to raise suspicion of a hidden message even if original cover is known to the adversary. The proposed scheme is equally suitable for Chat, IM, SMS and email.
引用
收藏
页码:280 / 287
页数:8
相关论文
共 50 条
  • [1] Text Steganography in Chat Based on Emoticons and Interjections
    Liu, Yuling
    Yang, Ting
    Xin, Guojiang
    [J]. JOURNAL OF COMPUTATIONAL AND THEORETICAL NANOSCIENCE, 2015, 12 (09) : 2091 - 2094
  • [2] Secure Steganography Scheme Based on Steganography Generative Adversarial Network
    Pan, Guangxu
    Yang, Zhongpeng
    Ma, Yong
    [J]. FRONTIERS IN CYBER SECURITY, FCS 2023, 2024, 1992 : 487 - 502
  • [3] Secure steganography based on embedding capacity
    Hedieh Sajedi
    Mansour Jamzad
    [J]. International Journal of Information Security, 2009, 8 : 433 - 445
  • [4] Steganography-Based Secure Communication
    Bhatia, Manjot
    Muttoo, Sunil Kumar
    Bhatia, M. P. S.
    [J]. PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON SOFT COMPUTING FOR PROBLEM SOLVING (SOCPROS 2012), 2014, 236 : 781 - 792
  • [5] Secure steganography based on embedding capacity
    Sajedi, Hedieh
    Jamzad, Mansour
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2009, 8 (06) : 433 - 445
  • [6] Puzzle based Highly Secure Steganography
    Shankar, Siva S.
    Rengarajan, A.
    [J]. 2017 INTERNATIONAL CONFERENCE ON ALGORITHMS, METHODOLOGY, MODELS AND APPLICATIONS IN EMERGING TECHNOLOGIES (ICAMMAET), 2017,
  • [7] Secure Key Based Image Realization Steganography
    Samima, Shabnam
    Roy, Ratnakirti
    Changder, Suvamoy
    [J]. 2013 IEEE SECOND INTERNATIONAL CONFERENCE ON IMAGE INFORMATION PROCESSING (ICIIP), 2013, : 377 - 382
  • [8] A Highly Secure DNA Based Image Steganography
    Das, Prasenjit
    Kar, Nirmalya
    [J]. 2014 INTERNATIONAL CONFERENCE ON GREEN COMPUTING COMMUNICATION AND ELECTRICAL ENGINEERING (ICGCCEE), 2014,
  • [9] Secure Steganography Technique Based on Bitplane Indexes
    Abdulla, Alan Anwer
    Jassim, Sabah A.
    Sellahewa, Harin
    [J]. 2013 IEEE INTERNATIONAL SYMPOSIUM ON MULTIMEDIA (ISM), 2013, : 287 - 291
  • [10] Secure communication method based on encryption and steganography
    Duluta, Andrei
    Mocanu, Stefan
    Pietraru, Radu
    Merezeanu, Daniel
    Saru, Daniela
    [J]. 2017 21ST INTERNATIONAL CONFERENCE ON CONTROL SYSTEMS AND COMPUTER SCIENCE (CSCS), 2017, : 453 - 458