SEBS - Secure Emoticons Based Steganography

被引:0
|
作者
Rafat, Khan Farhan [1 ]
Hussain, Junaid [1 ]
机构
[1] NUST, Rawalpindi Islamabad, Pakistan
关键词
information security; information assurance; steganography; data privacy; secure communication information hiding; private texting; secret messages; security through obscurity; cryptography; encryption;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Be it a commercial or military undertaking, the decisive factor of one's success in the respective arena is to have uninterrupted operation-critical activities. On account of large scale reliance on information technology, affording maximum protection to data has become extremely essential to manage fluctuating business trends. By and large, Cryptographic Services are being employed to secure the data. Secure encryption, indeed, is a remedy against eavesdropping of sensitive information but its perceptibility - as something being gibberish - is sufficient enough to seek immediate attention of an onlooker which raises suspicion of some behind the scene activity. Hence, there felt a serious need to hide sensitive data in a manner such that its existence shall remain unknown to the unauthorized person. To address the perceptibility concern, various image based digital steganographic schemes have been introduced. However, it is observed that existing image-based digital steganographic schemes do not take into consideration the worst case scenario that the enemy can also have the possession of original cover. To overcome this shortcoming, this paper presents a novel steganographic scheme which is effective against known-cover attack. Furthermore, it provides greater cryptographic security by adhering to Kerckhoff's principal and successfully protects private or classified information, whether at rest or in transit. Our steganographic scheme provides a method to protect information by hiding it behind emoticons - a popular means of conversation in mobile communication and social media these days. A single emoticon in our scheme can conceal up to 8 bits of secret information. This scheme affords robustness via unique set of emoticons. We present twofold security via encryption and steganography. Hence, this scheme is most unlikely to raise suspicion of a hidden message even if original cover is known to the adversary. The proposed scheme is equally suitable for Chat, IM, SMS and email.
引用
收藏
页码:280 / 287
页数:8
相关论文
共 50 条
  • [41] Secure Binary Image Steganography Based on Fused Distortion Measurement
    Lu, Wei
    He, Liyu
    Yeung, Yuileong
    Xue, Yingjie
    Liu, Hongmei
    Feng, Bingwen
    [J]. IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2019, 29 (06) : 1608 - 1618
  • [42] Secure binary image steganography based on LTP distortion minimization
    Yuileong Yeung
    Wei Lu
    Yingjie Xue
    Junjia Chen
    Ruipeng Li
    [J]. Multimedia Tools and Applications, 2019, 78 : 25079 - 25100
  • [43] A Detailed Review Based on Secure Data Transmission Using Cryptography and Steganography
    Varghese, Fredy
    Sasikala, P.
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2023, 129 (04) : 2291 - 2318
  • [44] A Secure Text Communication Scheme Based on Combination of Compression, Cryptography, and Steganography
    Saneja, Kirti
    Kumar, Mukesh
    Sharma, Pallavi
    [J]. PROCEEDINGS OF INTERNATIONAL CONFERENCE ON ICT FOR SUSTAINABLE DEVELOPMENT, ICT4SD 2015, VOL 1, 2016, 408 : 205 - 214
  • [45] Secure halftone image steganography based on density preserving and distortion fusion
    Yu, Mujian
    Yin, Xiaolin
    Liu, Wanteng
    Lu, Wei
    [J]. SIGNAL PROCESSING, 2021, 188
  • [46] A Detailed Review Based on Secure Data Transmission Using Cryptography and Steganography
    Fredy Varghese
    P. Sasikala
    [J]. Wireless Personal Communications, 2023, 129 : 2291 - 2318
  • [47] New High Secure Network Steganography Method Based on Packet Length
    Sabeti, Vajiheh
    Shoaei, Minoo
    [J]. ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2020, 12 (01): : 24 - 34
  • [48] A Secure Steganography Algorithm Using Compressive Sensing based on HVS Feature
    Shafee, Samaneh
    Rajaei, Boshra
    [J]. 2017 SEVENTH INTERNATIONAL CONFERENCE ON EMERGING SECURITY TECHNOLOGIES (EST), 2017, : 73 - 77
  • [49] Histogram Secure Steganography System in JPEG File Based on Modulus Function
    Banoci, Vladimir
    Bugar, Gabriel
    Levicky, Dusan
    Klenovicova, Zita
    [J]. PROCEEDINGS OF THE 22ND INTERNATIONAL CONFERENCE - RADIOELEKTRONIKA 2012, 2012, : 297 - 300
  • [50] A Symmetric Key Based Secure Communication Framework Using Adaptive Steganography
    Gunawardena, Sudantha
    Kulkarni, Dhananjay
    [J]. 2016 4TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY (ICOICT), 2016,