SEBS - Secure Emoticons Based Steganography

被引:0
|
作者
Rafat, Khan Farhan [1 ]
Hussain, Junaid [1 ]
机构
[1] NUST, Rawalpindi Islamabad, Pakistan
关键词
information security; information assurance; steganography; data privacy; secure communication information hiding; private texting; secret messages; security through obscurity; cryptography; encryption;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Be it a commercial or military undertaking, the decisive factor of one's success in the respective arena is to have uninterrupted operation-critical activities. On account of large scale reliance on information technology, affording maximum protection to data has become extremely essential to manage fluctuating business trends. By and large, Cryptographic Services are being employed to secure the data. Secure encryption, indeed, is a remedy against eavesdropping of sensitive information but its perceptibility - as something being gibberish - is sufficient enough to seek immediate attention of an onlooker which raises suspicion of some behind the scene activity. Hence, there felt a serious need to hide sensitive data in a manner such that its existence shall remain unknown to the unauthorized person. To address the perceptibility concern, various image based digital steganographic schemes have been introduced. However, it is observed that existing image-based digital steganographic schemes do not take into consideration the worst case scenario that the enemy can also have the possession of original cover. To overcome this shortcoming, this paper presents a novel steganographic scheme which is effective against known-cover attack. Furthermore, it provides greater cryptographic security by adhering to Kerckhoff's principal and successfully protects private or classified information, whether at rest or in transit. Our steganographic scheme provides a method to protect information by hiding it behind emoticons - a popular means of conversation in mobile communication and social media these days. A single emoticon in our scheme can conceal up to 8 bits of secret information. This scheme affords robustness via unique set of emoticons. We present twofold security via encryption and steganography. Hence, this scheme is most unlikely to raise suspicion of a hidden message even if original cover is known to the adversary. The proposed scheme is equally suitable for Chat, IM, SMS and email.
引用
收藏
页码:280 / 287
页数:8
相关论文
共 50 条
  • [21] Image Hiding Algorithm Based on Secure Steganography Mechanism
    Zhao, Lian
    Zhang, Yingzhou
    Wang, Xing
    Chen, Xinghao
    [J]. 2017 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY (CYBERC), 2017, : 122 - 129
  • [22] Fast and Secure Steganography Based on J-UNIWARD
    Su, Ante
    Ma, Sai
    Zhao, Xianfeng
    [J]. IEEE SIGNAL PROCESSING LETTERS, 2020, 27 : 221 - 225
  • [23] SECURE STEGANOGRAPHY BASED ON BINARY PARTICLE SWARM OPTIMIZATION
    Guo Yanqing Kong Xiangwei You Xingang(School of Electronic and Information Engineering
    [J]. Journal of Electronics(China), 2009, 26 (02) : 285 - 288
  • [24] Secure Cover Selection for Steganography
    Wang, Zichi
    Zhang, Xinpeng
    [J]. IEEE ACCESS, 2019, 7 : 57857 - 57867
  • [25] Secure Cover Selection Steganography
    Sajedi, Hedieh
    Jamzad, Mansour
    [J]. ADVANCES IN INFORMATION SECURITY AND ASSURANCE, 2009, 5576 : 317 - 326
  • [26] Discop: Provably Secure Steganography in Practice Based on "Distribution Copies"
    Ding, Jinyang
    Chen, Kejiang
    Wang, Yaofei
    Zhao, Na
    Zhang, Weiming
    Yu, Nenghai
    [J]. 2023 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, SP, 2023, : 2238 - 2255
  • [27] An Efficient Sound and Data Steganography Based Secure Authentication System
    Datta, Debajit
    Garg, Lalit
    Srinivasan, Kathiravan
    Inoue, Atsushi
    Reddy, G. Thippa
    Reddy, M. Praveen Kumar
    Ramesh, K.
    Nasser, Nidal
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2021, 67 (01): : 723 - 751
  • [28] Robust and Secure Image Steganography Based on Elliptic Curve Cryptography
    Ahmed, Diaa E. M.
    Khalifa, Othman O.
    [J]. 2014 INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION ENGINEERING (ICCCE), 2014, : 288 - 291
  • [29] Secure high payload steganography: A model-based approach
    Rabie, Tamer
    Baziyad, Mohammed
    Kamel, Ibrahim
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021, 63
  • [30] A Methodology Based on Steganography and Cryptography to Protect Highly Secure Messages
    Rasras, Rashad J.
    AlQadi, Ziad A.
    Abu Sara, Mutaz Rasmi
    [J]. ENGINEERING TECHNOLOGY & APPLIED SCIENCE RESEARCH, 2019, 9 (01) : 3681 - 3684