Compression-based steganography

被引:7
|
作者
Carpentieri, Bruno [1 ]
Castiglione, Arcangelo [1 ]
De Santis, Alfredo [1 ]
Palmieri, Francesco [1 ]
Pizzolante, Raffaele [1 ]
机构
[1] Univ Salerno, Dept Comp Sci, I-84084 Fisciano, Italy
来源
关键词
advanced steganography systems; compressed archives; data protection; forensics; innovative security; secret data management;
D O I
10.1002/cpe.5322
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Conventional privacy-enforcement mechanisms, such as encryption-based ones, are frequently used to prevent third-party eavesdroppers to intercept confidential information exchanged between two or more parties. However, the use of such mechanisms can be perceivable and it alerts the involved intercepting entities that could devote some effort in trying to remove the protection, eg, by cracking the encryption keys used or by exploiting the vulnerabilities of the technological solution used to protect the data. Sometimes, from the security point of view, avoiding to draw the attention or suspect to intermediate intercepting entities, may be better than protecting a data in a conventional manner. In such direction, one of the most effective approaches is hiding the secret information to be exchanged inside other data, through steganographic techniques. In this work, we exploit, for this specific purpose, the hierarchical structure of a compressed archive, as well as the algorithms and parameters used to create and maintain such archive. It is important to point out that, by doing this, the secret information is in no way semantically related to the contents of the compressed archive. This can be extremely useful in many cloud-based situations where several confidential data is moved across multiple independent data center, which are under the control of different and not always fully trusted authorities. The effectiveness of this proposal has been assessed by using a properly designed and implemented prototype, where extensive tests have been performed within the context of a proof-of-concept.
引用
收藏
页数:16
相关论文
共 50 条
  • [1] A compression-based text steganography method
    Satir, Esra
    Isik, Hakan
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2012, 85 (10) : 2385 - 2394
  • [2] EFFICIENT STEGANOGRAPHY DETECTION BY MEANS OF COMPRESSION-BASED INTEGRAL CLASSIFIER
    Monarev, V. A.
    Pestunov, A. I.
    [J]. PRIKLADNAYA DISKRETNAYA MATEMATIKA, 2018, (40): : 59 - 71
  • [3] Compression-Based Compressed Sensing
    Rezagah, Farideh E.
    Jalali, Shirin
    Erkip, Elza
    Poor, H. Vincent
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2017, 63 (10) : 6735 - 6752
  • [4] Compression-based image registration
    Bardera, Anton
    Feixas, Miquel
    Boada, Imma
    Sbert, Mateu
    [J]. 2006 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, VOLS 1-6, PROCEEDINGS, 2006, : 436 - +
  • [5] Compression-based AODE Classifiers
    Corani, G.
    Antonucci, A.
    De Rosa, R.
    [J]. 20TH EUROPEAN CONFERENCE ON ARTIFICIAL INTELLIGENCE (ECAI 2012), 2012, 242 : 264 - +
  • [6] Compression-based Facies Modelling
    Manzocchi, Tom
    Walsh, Deirdre A.
    Carneiro, Marcus
    Lopez-Cabrera, Javier
    [J]. MATHEMATICAL GEOSCIENCES, 2023, 55 (05) : 625 - 644
  • [7] Compression-based spam filter
    Almeida, Tiago A.
    Yamakami, Akebo
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (04) : 327 - 335
  • [8] Compression-based Facies Modelling
    Tom Manzocchi
    Deirdre A. Walsh
    Marcus Carneiro
    Javier López-Cabrera
    [J]. Mathematical Geosciences, 2023, 55 : 625 - 644
  • [9] On compression-based text classification
    Marton, Y
    Wu, N
    Hellerstein, L
    [J]. ADVANCES IN INFORMATION RETRIEVAL, 2005, 3408 : 300 - 314
  • [10] A Compression-Based Method for Stemmatic Analysis
    Roos, Teemu
    Heikkila, Tuomas
    Myllymaki, Petri
    [J]. ECAI 2006, PROCEEDINGS, 2006, 141 : 805 - +