74,175 research outputs found

    Hiding Inside HTML and Other Source Codes

    Full text link
    Many steganographic techniques were proposed for hiding secret message inside images, the simplest of them being the LSB data hiding. In this paper, we suggest a novel data hiding technique in an HTML Web page and also propose some simple techniques to extend the embedding technique to source codes written in any programming language (both case insensitive like HTML, Pascal and case sensitive languages like C, C++, Java). We basically try to exploit the case-redundancy in case-insensitive language, while we try hiding data with minimal changes in the source code (almost not raising suspicion). HTML Tags are case insensitive and hence an alphabet in lowercase and one in uppercase present inside an HTML tag are interpreted in the same manner by the browser, i.e., change in case in a web page is imperceptible to the browser. We first exploit this redundancy and use it to embed secret data inside an web page, with no changes visible to the user of the web page, so that he can not even suspect about the data hiding. The embedded data can be recovered by viewing the source of the HTML page. This technique can easily be extended to embed secret message inside any piece of source-code where the standard interpreter of that language is case-insensitive. For case-sensitive programming languages we do minimal changes in the source code (e.g., add an extra character in the token identified by the lexical analyzer) without violating the lexical and syntactic notation for that language) and try to make the change almost imperceptible.Comment: 10 Pages, 7 Figures, 2 Algorithm

    Data Hiding with Deep Learning: A Survey Unifying Digital Watermarking and Steganography

    Full text link
    Data hiding is the process of embedding information into a noise-tolerant signal such as a piece of audio, video, or image. Digital watermarking is a form of data hiding where identifying data is robustly embedded so that it can resist tampering and be used to identify the original owners of the media. Steganography, another form of data hiding, embeds data for the purpose of secure and secret communication. This survey summarises recent developments in deep learning techniques for data hiding for the purposes of watermarking and steganography, categorising them based on model architectures and noise injection methods. The objective functions, evaluation metrics, and datasets used for training these data hiding models are comprehensively summarised. Finally, we propose and discuss possible future directions for research into deep data hiding techniques

    The Art of Data Hiding with Reed-Solomon Error Correcting Codes

    Full text link
    With the tremendous advancements in technology and the Internet, data security has become a major issue around the globe. To guarantee that data is protected and does not go to an unintended endpoint, the art of data hiding (steganography) emerged. Steganography is the art of hiding information such that it is not detectable to the naked eye. Various techniques have been proposed for hiding a secret message in a carrier document. In this paper, we present a novel design that applies Reed-Solomon (RS) error correcting codes in steganographic applications. The model works by substituting the redundant RS codes with the steganographic message. The experimental results show that the proposed design is satisfactory with the percentage of decoded information 100% and percentage of decoded secret message 97. 36%. The proposed model proved that it could be applied in various steganographic applications

    Trends toward real-time network data steganography

    Full text link
    Network steganography has been a well-known covert data channeling method for over three decades. The basic set of techniques and implementation tools have not changed significantly since their introduction in the early 1980's. In this paper, we review the predominant methods of classical network steganography, describing the detailed operations and resultant challenges involved in embedding data in the network transport domain. We also consider the various cyber threat vectors of network steganography and point out the major differences between classical network steganography and the widely known end-point multimedia embedding techniques, which focus exclusively on static data modification for data hiding. We then challenge the security community by introducing an entirely new network dat hiding methodology, which we refer to as real-time network data steganography. Finally we provide the groundwork for this fundamental change of covert network data embedding by forming a basic framework for real-time network data operations that will open the path for even further advances in computer network security.Comment: 20 pages introducing the concept of real-time network steganograph

    On the usefulness of information hiding techniques for wireless sensor networks security

    Full text link
    A wireless sensor network (WSN) typically consists of base stations and a large number of wireless sensors. The sensory data gathered from the whole network at a certain time snapshot can be visualized as an image. As a result, information hiding techniques can be applied to this "sensory data image". Steganography refers to the technology of hiding data into digital media without drawing any suspicion, while steganalysis is the art of detecting the presence of steganography. This article provides a brief review of steganography and steganalysis applications for wireless sensor networks (WSNs). Then we show that the steganographic techniques are both related to sensed data authentication in wireless sensor networks, and when considering the attacker point of view, which has not yet been investigated in the literature. Our simulation results show that the sink level is unable to detect an attack carried out by the nsF5 algorithm on sensed data

    On Using Linear Diophantine Equations to Tune the extent of Look Ahead while Hiding Decision Tree Rules

    Full text link
    This paper focuses on preserving the privacy of sensitive pat-terns when inducing decision trees. We adopt a record aug-mentation approach for hiding sensitive classification rules in binary datasets. Such a hiding methodology is preferred over other heuristic solutions like output perturbation or crypto-graphic techniques - which restrict the usability of the data - since the raw data itself is readily available for public use. In this paper, we propose a look ahead approach using linear Diophantine equations in order to add the appropriate number of instances while minimally disturbing the initial entropy of the nodes.Comment: 10 pages, 5 figures. arXiv admin note: substantial text overlap with arXiv:1706.0573

    Securing SQLJ Source Codes from Business Logic Disclosure by Data Hiding Obfuscation

    Full text link
    Information security is protecting information from unauthorized access, use, disclosure, disruption, modification, perusal and destruction. CAIN model suggest maintaining the Confidentiality, Authenticity, Integrity and Non-repudiation (CAIN) of information. Oracle 8i, 9i and 11g Databases support SQLJ framework allowing embedding of SQL statements in Java Programs and providing programmer friendly means to access the Oracle database. As cloud computing technology is becoming popular, SQLJ is considered as a flexible and user friendly language for developing distributed applications in grid architectures. SQLJ source codes are translated to java byte codes and decompilation is generation of source codes from intermediate byte codes. The intermediate SQLJ application byte codes are open to decompilation, allowing a malicious reader to forcefully decompile it for understanding confidential business logic or data from the codes. To the best of our knowledge, strong and cost effective techniques exist for Oracle Database security, but still data security techniques are lacking for client side applications, giving possibility for revelation of confidential business data. Data obfuscation is hiding the data in codes and we suggest enhancing the data security in SQLJ source codes by data hiding, to mitigate disclosure of confidential business data, especially integers in distributed applications.Comment: 4 pages,3 Figure

    Data Hiding Techniques In Digital Images

    Get PDF
    With literally millions of images moving on the Internet each year it is safe to say that hiding data in digital image is of real concern to many in the security field. Therefore how to protect secret messages during transmission becomes an important issue. Hiding data provides a good layer of protection on the secret message, so the purpose of this thesis is to study the data hiding techniques in digital images as a new and powerful technology capable of solving important practical problems. Depending on what information in which form is hidden in the digital images, one can distinguish two types of data hiding techniques, spatial domain techniques, and frequency domain techniques. In the spatial domain techniques, a digital image serves as a carrier for a secret message. For instance, by replacing the least significant bit of each pixel in the carrier image with the secret message after changing it to stream of bits, the changes to the carrier image will be imperceptible and the secret message will be masked by carrier image. In this side, two programs had been implemented using MATLAB program to illustrate the main idea involved in least significant technique (low bit encoding), and the other to illustrate the masking technique inside the carrier image. In the frequency domain techniques, a short message is embedded in the carrier image in a robust algorithm. Robustness means the ability to survive common image processing operations, such as lossy compression, filtering, noise adding, geometrical transformations, etc. So in this technique two programs had been implemented to illustrate the main idea involved in frequency domain, one with the Fast Fourier Transform (FFT), and the other with the Discrete Wavelet Transform (DWT). After all these studies, one of the algorithms in the masking technique is developed and implemented using JAVA program to embed message into true color image with a good quality and higher capacity. Beside that the carrier images in different techniques were examined by exposing them to common signal processing operations such as image resizing, rotation, histogram equalization, lossy Compression, and Gaussian noise addition to illustrate the characteristic of the data hiding techniques, such as hiding capacity, robustness, undetectability, and perceptual transparency Finally, it has been shown that the frequency transformation techniques are more robust, and hence suitable for water marking and data hiding purpose. The spatial domain techniques exhibit loss robustness but due to its higher capacity and good quality are perfect for data hiding purposes

    Data set operations to hide decision tree rules

    Full text link
    This paper focuses on preserving the privacy of sensitive patterns when inducing decision trees. We adopt a record augmentation approach for hiding sensitive classification rules in binary datasets. Such a hiding methodology is preferred over other heuristic solutions like output perturbation or cryptographic techniques - which restrict the usability of the data - since the raw data itself is readily available for public use. We show some key lemmas which are related to the hiding process and we also demonstrate the methodology with an example and an indicative experiment using a prototype hiding tool.Comment: 7 pages, 4 figures and 2 tables. ECAI 201

    Comparative Analysis of Image Stenography Techniques for Image Quality & Security

    Get PDF
    In this paper, discuss about the data hiding using the wavelet approach is better technique in stegnography techniques. optimization techniques are better results provides for the data hiding in stenography. In Discrete Wavelet Transform, HAAR Wavelet gives the excellent peak signal to noise ratio (PSNR) and less computation time. In optimization, particle swarm optimization technique is gives excellent better result in case of PSNR ratio.In spatial domain, common useful technique is least significant bit(LSB) gives better result in case of data payload capacity and less computation time. In paper mentioned, all above techniques with compare to other related techniques useful in stegnography
    corecore