ABSTRACT
The digitization of analog signals has inadvertently opened doors for Covert Channel communication which is being exploited as an innocent carrier of Secret information. A number of techniques have been proposed and are in use to attain confidentiality, integrity and authentication for on-line transaction/exchange of messages of which Cryptography and Steganography stands ahead.
Cryptography is focused on changing the contents in a manner difficult for the adversary to interpret. Steganography, on the other hand emphasizes on hiding the existence of secret information i.e. making these appear as non-existent.
The ability to express more in fewer bits and less printing cost involved has made Text file format as an ideal candidate for hiding priceless secrets inside its body.
This Ph.D. research proposal aims at evolving a new steganographic technique for hiding information in digital ASCII Text documents, an area of research considered as the most difficult [1] because digital ASCII Text documents are devoid of any extra overhead to hide information within it. This is followed by software implementation / simulation of the concept together with proposing new / enhancing some existing text-based Steganographic techniques / methods.
- W. Bender, D. Gruhl, N. Morimoto, and A. Lu, Techniques for data hiding IBM Systems Journal, Vol. 35, Issues 3&4, pp. 313--336, 1996. Google ScholarDigital Library
- Dave Kleiman (Technical Editor), Kevin Cardwell, Timothy Clinton, Michael Cross, Michael Gregg, Jesse Varsalone, The Official CHFI Study Guide (Exam 312--49) for Computer Hacking Forensic Investigators, Published by: Syngress Publishing, Inc., Elsevier, Inc., 30 Corporate Drive, Burlington, MA 01803, Craig Wright Google ScholarDigital Library
- Stefan Katzenbeisser, Fabien A. P. Petitcolas, Information Hiding Techniques for Steganography and Digital Watermarking, Artech House, Boston - London Google ScholarDigital Library
- Nedeljko Cvejic, Algorithms For Audio Watermarking And-Steganography, Department of Electrical and Information engineering, Information Processing Laboratory, University of Oulu, 2004.Google Scholar
- Jessica Fridrich, Tomáš Pevný, Jan Kodovský, Statistically Undetectable JPEG Steganography: Dead Ends, Challenges, and Opportunities, Copyright 2007 ACM 978-1-59593-857-2/07/0009 ...$5.00.Google Scholar
- Mohammad Sirali-Shahreza, M. Hassan Shirali- Shahreza, Text Steganography in Chat, 1-4244-1007/07 © 2007 IEEEGoogle Scholar
- Mohammad Shirali-Shahreza, Text Steganography by Changing Words Spelling, ISBN 978-89-5519-136-3, Feb. 17--20, 2008 ICACT 2008Google Scholar
- M. Hassan Shirali-Shahreza, Mohammad Shirali-Shahreza, A New Synonym Text Steganography, International Conference on Intelligent Information Hiding and Multimedia Signal Processing 978-0-7695-3278-3/08 © 2008 IEEE Google ScholarDigital Library
- Mercan Topkara, Umut Topkara, Mikhail J. Atallah, Information Hiding Through Errors: A Confusing Approach, Purdue UniversityGoogle Scholar
- Tsung-Yuan Liu, Wen-Hsiang Tsai, and Senior Member, A New Steganographic Method for Data Hiding in Microsoft Word Documents by a Change Tracking Technique, 1556--6013 © 2007 IEEEGoogle Scholar
- NeoByte Solutions, "Invisible Secrets 4", http://www.invisiblesecrets.com/index.htmlGoogle Scholar
- Mohammad Shirali Shahreza, A New Method for Steganography in HTML Files, Computer, Information, and Systems Sciences, and Engineering, Proceedings of IETA 2005, TeNe 2005, EIAE 2005, 247--251, SpringerGoogle Scholar
- K. Bennett, "Linguistic Steganography: Survey, Analysis, and Robustness Concerns for Hiding Information in Text", Purdue University, CERIAS Tech. Report 2004--13Google Scholar
- HIPS Systems, "Shadow Text", http://home.apu.edu/~jcox/projects/HtmlStegolGoogle Scholar
- Digital steganography for ASCII text documents Ph.D. research proposal
Recommendations
LSB steganographic method based on reversible histogram transformation function for resisting statistical steganalysis
Statistical steganalysis schemes detect the existence of secret information embedded by steganography. The x^2-detection and Regular-Singular (RS)-attack methods are two well-known statistical steganalysis schemes used against LSB (least significant bit)...
An efficient high payload ±1 data embedding scheme
Embedding of confidential data in the least significant bit of an image is still an attractive method of steganography. Utilizing the full capacity of cover images by embedding one bit of data per pixel, using methods such as LSB flipping or LSB ...
Implementation of Least Significant Bit Steganography and statistical steganalysis
CCSEIT '12: Proceedings of the Second International Conference on Computational Science, Engineering and Information TechnologyLeast Significant Bit (LSB) Steganography is a method for hidden information in such a way that can only be detected by its intended recipient. Steganography in Digital media becomes a challenging discipline, since the Human Auditory System (HAS) is ...
Comments