Skip to main content
Log in

Listega: list-based steganography methodology

  • Regular Contribution
  • Published:
International Journal of Information Security Aims and scope Submit manuscript

Abstract

The use of textual list of items, e.g., products, subjects, books, etc., is widely popular and linguistically legible. This motivates the development of List-Based Steganography Methodology (Listega). Listega takes advantage of such use of textual list to camouflage data by exploiting itemized data to conceal messages. Simply, it encodes a message then assigns it to legitimate items in order to generate a text-cover in a form of list. The generated list of items, the text-cover, can be embedded among other legitimate noncoded items for more protection based on a predetermined protocol among communicating parties such as read every other item, every fifth item, or any other way than the use of particular sequence. Listega neither hides data in a noise (errors) nor produces noise. Instead, it camouflages data by manipulating noiseless list of legitimate items. Listega establishes a covert channel among communicating parties by employing justifiably reasons based on the common practice of using textual list of items in order to achieve unsuspicious transmission of generated covers. The presented implementation, validation, and steganalysis of Listega demonstrate: the robustness capabilities of achieving the steganographic goal, the adequate room for concealing data, and the superior bitrate of roughly 1.32 up to 3.87% than contemporary linguistic steganography approaches.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Kipper, G.: Investigator’s Guide to Steganography, pp. 15–16. CRC Press LLC, Boca Raton (2004)

  2. Davern, P., Scott, M.: Steganography its history and its application to computer based data files. Internal Report Working Paper: CA-0795. School of Computing, Dublin City University. http://computing.dcu.ie/research/papers/1995/0795.pdf (1995). Accessed 3 Aug 2006

  3. Johnson N.F., Katzenbeisser S.: A survey of steganographic techniques. In: Katzenbeisser, S., Petitcolas, F.(eds) Information Hiding, pp. 43–78. Artech House, Norwood (1999)

    Google Scholar 

  4. Kessler, G.C.: An Overview of Steganography for the Computer Forensics Examiner. An edited version, issue of Forensic Science Communications. Technical Report, 6, No. 3 (2004)

  5. Martin A., Sapiro G., Seroussi G.: Is image steganography natural? IEEE Trans. Image Process. 14(12), 2040–2050 (2005)

    Article  Google Scholar 

  6. Desoky A.: Graphstega: graph steganography methodology. J. Digit. Forensic Pract. 2(1), 27–36 (2008). doi:10.1080/15567280701797087

    Article  Google Scholar 

  7. Desoky, A., Younis, M.: PSM: Public Steganography Methodology. Technical Report TR-CS-06–07, Department of Computer Science and Electrical Engineering, University of Maryland, Baltimore County (2006)

  8. Petitcolas, F.A.P.: Information hiding—a survey. In: Anderson, R.J., Kuhn, M.G. (eds.) Proceedings of the IEEE, vol. 87(7), pp. 1062–1078 (1999)

  9. Bennett, K.: Linguistic Steganography: Survey, Analysis, and Robustness Concerns for Hiding Information in Text. Technical Report CERIAS Tech Report 2004–13, Purdue University (2004)

  10. Shirali-Shahreza, M.H., Shirali-Shahreza, M.: A new approach to Persian/Arabic text steganography. In: The Proceedings of 5th IEEE/ACIS International Conference on Computer and Information Science (ICIS-COMSAR 2006), 10–12 July, pp. 310–315. Honolulu, Hawaii (2006)

  11. Anderson, R.J., Needham, R., Shamir, A.: The steganographic file system. In: Proceedings of the Second International Workshop on Information Hiding. Lecture Notes in Computer Science, vol. 1525, pp. 73–82. Springer, Berlin (1998)

  12. ScramDisk: Free Hard Drive Encryption For Windows 95 & 98. http://www.scramdisk.clara.net. Accessed 3 Aug 2008

  13. Handel, T.G., Sandford, M.T.: Data hiding in the OSI network model. In: Information Hiding: First International Workshop, Proceedings. Lecture Notes in Computer Science, vol. 1174, pp. 23–38. Springer, Berlin (1996)

  14. Kahn, D.: The Codebreakers: The Story of Secret Writing. Revised edition. Scribner, New York (1996)

  15. Wayner, P.: Mimic functions. Cryptologia XVI(3), 193–214 (1992). doi:10.1080/0161-119291866883

  16. Wayner, P.: Disappearing Cryptography, 2nd edn, pp. 81–128. Morgan Kaufmann, Menlo Park (2002)

  17. Chapman, M., Davida, G.: Hiding the hidden: a software system for concealing ciphertext as innocuous text. In: The Proceedings of the International Conference on Information and Communications Security. Lecture Notes in Computer Science, vol. 1334, pp. 335–345. Springer, Beijing (1997)

  18. Chapman, M., Davida, G.I.: Nicetext System Official Home Page. http://www.nicetext.com. Accessed 3 Aug 2007

  19. Chapman, M. et al.: A practical and effective approach to large-scale automated linguistic steganography. In: Proceedings of the Information Security Conference (ISC’01), pp. 156–165. Lecture Notes in Computer Science, vol. 2200. Springer, Malaga (2001)

  20. Chapman, M., Davida, G.I.: Plausible deniability using automated linguistic steganography. In: Davida, G., Frankel, Y. (eds.) International Conference on Infrastructure Security (InfraSec’02). Lecture Notes in Computer Science, vol. 2437, pp. 276–287. Springer, Berlin (2002)

  21. Grothoff, C. et al.: Translation-based steganography. Technical Report CSD TR# 05-009, Purdue University (CERIAS Tech Report 2005-39) (2005)

  22. Grothoff, C. et al.: Translation-based steganography. In: Proceedings of Information Hiding Workshop (IH 2005), pp. 213–233. Springer, Barcelona (2005)

  23. Stutsman, R. et al.: Lost in just the translation. In: Proceedings of the 21st Annual ACM Symposium on Applied Computing (SAC’06). Dijon, France (2006)

  24. Topkara, M., Topkara, U., Atallah, M.J.: Information hiding through errors: a confusing approach. In: Proceedings of the SPIE International Conference on Security, Steganography, and Watermarking of Multimedia Contents (2007)

  25. Shirali-Shahreza, M. et al.: Text steganography in SMS. In: International Conference on Convergence Information Technology, Issue 21–23, pp. 2260–2265 (2007)

  26. Winstein, K.: Lexical steganography through adaptive modulation of the word choice hash. January 1999. Secondary education at the Illinois Mathematics and Science Academy. http://alumni.imsa.edu/~keithw/tlex/lsteg.ps. Accessed 15 April 2008

  27. Winstein, K.: Lexical steganography. http://alumni.imsa.edu/~keithw/tlex. Accessed 3 Aug 2008

  28. Bolshakov, I.A.: A method of linguistic steganography based on collocationally-verified synonymy. In: Fridrich, J.J. (ed.) Information Hiding: 6th International Workshop. Lecture Notes in Computer Science, vol. 3200, pp. 180–191. Springer, Berlin (2004)

  29. Bolshakov, I.A., Gelbukh, A.: Synonymous paraphrasing using wordnet and internet. In: Meziane, F., Metais, E. (eds.) Natural Language Processing and Information Systems: 9th International Conference on Applications of Natural Language to Information Systems, NLDB 2004. Lecture Notes in Computer Science, vol. 3136, pp. 312–323. Springer, Berlin (2004)

  30. Calvo, H., Bolshakov, I.A.: Using selectional preferences for extending a synonymous paraphrasing method in steganography. In: Sossa Azuela, J.H. (ed.) Avances en Ciencias de la Computacion e Ingenieria de Computo—CIC’2004: XIII Congreso Internacional de Computacion, pp. 231–242 (2004)

  31. Chand, V., Orgun, C.O.: Exploiting linguistic features in lexical steganography: design and proof-of-concept implementation. In: Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS’06), vol. 6, p. 126b. IEEE, New York (2006)

  32. Nakagawa, H., Sampei, K., Matsumoto, T., Kawaguchi, S., Makino, K., Murase, I.: Text information hiding with preserved meaning—a case for japanese documents. IPSJ Trans. 42(9):2339–2350 (2001). Originally published in Japanese. A similar paper By the first author in English. http://www.r.dl.itc.u-tokyo.ac.jp/nakagawa/academic-res/finpri02.pdf. Accessed 4 June 2008

  33. Niimi, M., Minewaki, S., Noda, H., Kawaguchi, E.: A framework of text-based steganography using sd-form semantics model. IPSJ J. 44(8) (2003). http://www.know.comp.kyutech.ac.jp/STEG03/STEG03-PAPERS/papers/12-Niimi.pdf. Accessed 3 June 2008

  34. Bergmair, R., Katzenbeisser, S.: Content-aware steganography: about lazy prisoners and narrow-minded wardens. In: Proceedings of the 8th Information Hiding Workshop. Lecture Notes in Computer Science, vol. 4437, pp. 109–123. Springer, Berlin (2007) (in print)

  35. Bergmair, R.: Towards linguistic steganography: a systematic investigation of approaches, systems, and issues. final year project, The University of Derby (2004)

  36. Bergmair, R., Katzenbeisser, S.: Towards human interactive proofs in the text-domain. In: Proceedings of the 7th Information Security Conference (ISC’04). Lecture Notes in Computer Science. Springer, Berlin (2004)

  37. Topkara, U., Topkara, M., Atallah, M.J.: The hiding virtues of ambiguity: quantifiably resilient watermarking of natural language text through synonym substitutions. In: MM&Sec’06: Proceeding of the 8th Workshop on Multimedia and Security, pp. 164–174. ACM Press, New York (2006)

  38. Murphy, B., Vogel, C.: The syntax of concealment: reliable methods for plain text information hiding. In: Proceedings of the SPIE International Conference on Security, Steganography, and Watermarking of Multimedia Contents (2007)

  39. Atallah, M.J., Raskin, V., Crogan, M., Hempelmann, C., Kerschbaum, F., Mohamed, D., Naik, S.: Natural language watermarking: design, analysis, and a proof-of-concept implementation. In: Moskowitz, I.S. (ed.) Information Hiding: Fourth International Workshop. Lecture Notes in Computer Science, vol. 2137, pp. 185–199. Springer, Berlin (2001)

  40. Atallah, M.J., Raskin, V., Hempelmann, C.F., Topkara, M., Sion, R., Topkara, U., Triezenberg, K.E.: Natural language watermarking and tamperproofing. In: Petitcolas, F.A.P. (ed.) Information Hiding: Fifth International Workshop. Lecture Notes in Computer Science, vol. 2578, pp. 196–212. Springer, Berlin (2002)

  41. Desoky, A.: Nostega: noiseless steganography paradigm. J. Digit. Forensic Pract. (in press)

  42. Desoky, A. et al.: Auto-summarization-based steganography. In: The Proceedings of the 5th IEEE International Conference on Innovations in Information Technology, Al-Ain, UAE (2008) (in press)

  43. Cvejic, N., Seppanen, T.: Increasing robustness of LSB audio steganography using a novel embedding method. In: The Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC’04), pp. 533–537, Las Vegas, Nevada (2004)

  44. Cvejic, N., Seppanen, T.: Reduced distortion bit-modification for LSB audio steganography. In:’04. 2004 in the Proceedings of the 7th International Conference on Signal Processing (ICSP 04), vol. 3, pp. 2318–2321, Beijing, China (2004)

  45. Bender W. et al.: Techniques for data hiding. IBM Systems J. 35(3, 4), 313–336 (1996)

    Article  Google Scholar 

  46. Kirovski, D., Malvar, H.: Spread-spectrum audio watermarking: requirements, applications, and limitations. In: The Proceedings of the 4th IEEE Workshop on Multimedia Signal Processing, pp. 219–224. Cannes, France (2001)

  47. Ansari, R., Malik, H., Khokhar, A.: Data-hiding in audio using frequency-selective phase alteration. In: The Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing, (ICASSP’04), 17–21 May, vol. 5, pp. 389–92 (2004)

  48. Gruhl, D., Lu, A., Bender, W.: Echo hiding. In: The Proceedings of First International Workshop on Information Hiding. Lecture Notes in Computer Science, vol. 1174, pp. 295–316, Cambridge, UK. Springer, Berlin (1996)

  49. Desoky, A., Younis, M.: Chestega: chess steganography methodology. J. Secur. Commun. Netw. (in press)

  50. Laywine, C.F., Mullen, G.L.: Discrete Mathematics Using Latin Squares, 1st edn. Wiley-Interscience, London (1998)

  51. Dénes, J., Keedwell, A.D.: Latin Squares (Annals of Discrete Mathematics), vol. 46. Elsevier, North-Holland (1991)

  52. Google Internet Search Engine: http://www.google.com, used to generate the lest of items. Accessed 26 Sept 2008

  53. List of Songs: http://www.advicenators.com/qview.php?q=549142. Accessed 26 Sept 2008

  54. Intranet Book List: http://www.iblist.com. Accessed 26 Sept 2008

  55. Spam Mimic: http://www.spammimic.com. Accessed 31 July 2007

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Abdelrahman Desoky.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Desoky, A. Listega: list-based steganography methodology. Int. J. Inf. Secur. 8, 247–261 (2009). https://doi.org/10.1007/s10207-009-0079-0

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10207-009-0079-0

Keywords

Navigation