Study and Analysis of Text Steganography Tools

Full Text (PDF, 211KB), PP.45-52

Views: 0 Downloads: 0

Author(s)

Indradip Banerjee 1,* Souvik Bhattacharyya 2 Gautam Sanyal 1

1. Department of Computer Science & Engineering, National Institute of Technology, Durgapur, West Bengal, India

2. Department Computer Science & Engineering,University Institute of Technology, Burdwan University, Burdwan, India

* Corresponding author.

DOI: https://doi.org/10.5815/ijcnis.2013.12.06

Received: 7 Feb. 2013 / Revised: 5 May 2013 / Accepted: 11 Jul. 2013 / Published: 8 Oct. 2013

Index Terms

Text Steganography, Text Steganalysis, Security, Cover Text, Stego Text

Abstract

"Maintain the security of the secret information", this words has been a great challenge in our day to day life. Sender can send messages regularly through a communication channel like Internet, draws the attention of third parties, hackers and crackers, perhaps causing attempts to break and expose the unusual messages. Steganography is a gifted region which is used for secured data transmission over any public media. Wide quantity of research work has been established by different researchers on steganography. Steganalysis is an art and science of detecting messages hidden using steganography. Some research work has also been remarked in the field of Steganalysis also. In this contribution, we have gone through steganalysis attack of some established text steganography tools.

Cite This Paper

Indradip Banerjee, Souvik Bhattacharyya, Gautam Sanyal, "Study and Analysis of Text Steganography Tools", International Journal of Computer Network and Information Security(IJCNIS), vol.5, no.12, pp.45-52, 2013. DOI:10.5815/ijcnis.2013.12.06

Reference

[1]Fabien A.P. Petitcolas, Ross J. Anderson, Markus G. Kuhn: Information Hiding—A Survey, Proceedings of the IEEE, Vol. 87, No. 7, July 1999, pp. 1062-1078, ISSN 0018-9219.
[2]K. Bennett. Linguistic steganography: Survey, analysis, and robustness concerns for hiding information in text. Purdue University, CERIAS Tech. Report, 2004.
[3]Ross J. Anderson. and Fabien A.P.Petitcolas. On the limits of steganography. IEEE Journal on Selected Areas in Communications (J-SAC), Special Issue on Copyright and Privacy Protection, 16:474–481, 1998.
[4]JHP Eloff T Mrkel and MS Olivier. An overview of image steganography. In Proceedings of the fifth annual Information Security South Africa Conference, South Africa, 2005.
[5]S.P.Mohanty. Digital watermarking: A tutorial review. International Journal of Digital Evidence, Fall 2003, 2003.
[6]N.F.Johnson. and S. Jajodia. Steganography: seeing the unseen. IEEE Computer, 16:26–34, 1998.
[7]Kran Bailey Kevin Curran. An evaluation of image based steganography methods. International Journal of Digital Evidence,Fall 2003, 2003.
[8]D. Kahn. The codebreakers - the comprehensive history of secret communication from ancient times to the internet. Scribner, 1996.
[9]Z. Duric N. F. Johnson and S. Jajodia. Information hiding: Steganography and digital watermarking - attacks and countermeasures. Kluwer Academic, 2001.
[10]S. Low N.F. Maxemchuk J.T. Brassil and L. O.Gorman. Electronic marking and identification techniques to discourage document copying. IEEE Journal on Selected Areas in Communications, 13:1495–1504, 1995.
[11]G. Doerr and J.L. Dugelay. Security pitfalls of framebyframe approaches to video watermarking. IEEE Transactions on Signal Processing, Supplement on Secure Media., 52:2955–2964, 2004.
[12]G. Doerr and J.L. Dugelay. A guide tour of video watermarking. Signal Processing: Image Communication., 18:263–282, 2003.
[13]Kran Bailey Kevin Curran. An evaluation of image based steganography methods. 1999.
[14]Krista Bennett (2004). " Linguistic Steganography: Survey, Analysis, and Robustness Concerns for Hiding Information in Text". CERIAS TR 2004-13.
[15]F.A.P. Petitcolas, R.J. Anderson, M.G. Kuhn, "Information hiding - a survey", Proceedings of the IEEE, Vol.87, No.7, pp.1062–1078, 1999.
[16]C. Kraetzer, J. Dittmann, "Pros and cons of melcepstrum based audio steganalysis using SVM classification", The 9th International Workshop on Information Hiding, Saint Malo, France, pp.359–377, 2007.
[17]M.E. Choubassi, P. Moulin, "Noniterative algorithms for sensitivity analysis attacks", IEEE Transactions on Information Forensics and Security, Vol.2, No.3, pp.113–126, 2007.
[18]O.H. Kocal, E. Avcibas, "Chaotic-type features for speech steganalysis", IEEE Transactions on Information Forensics and Security, Vol.3, No.4, pp.651–661, 2008.
[19]Z.J. Wu, Y. Hu, X.X. Niu, H.X. Duan, X. Li, "Information hiding technique based speech secure communication over PSTN", Chinese Journal of Electronics, Vol.15, No.1, pp.108–112, 2009.
[20]H. Shan, K. Darko, "An estimation attack on content-based video fingerprinting", Transactions on Data Hiding and Multimedia Security II, Vol.4499, No.2007, pp.35–47, 2007.
[21]R. Bohme, "Weighted stego-image steganalysis for JPEG covers", The 10th International Workshop on Information Hiding, Santa Barbara, California, USA, pp.178–194, 2008.
[22]L.J. Li, L.S. Huang, X.X. Zhao, W. Yang, Z.L. Chen, "A statistical attack on a kind of word-shift text-steganography", The 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Harbin, China, pp.1503–1507, 2008.
[23]L.Y. Xiang, X.M. Sun, G. Luo, C. Gan, "Research on steganalysis for text steganography based on font format", The 3rd International Symposium on Information Assurance and Security, Manchester, United Kingdom, pp.490–495, 2007.
[24]J.W. Huang, X.M. Sun, H. Huang, G. Luo, "Detection of hidden information in webpages based on randomness", The 3rd International Symposium on Information Assurance and Security, Manchester, United kingdom, pp.447–452, 2007.
[25]H.J. Huang, X.M. Sun, Z.H. Li, G. Sun, "Detection of steganographic information in tags of webpage", The 2nd International Conference on Scalable Information Systems, Brussels, Belgium, pp.325–328, 2007.
[26]H.J. Huang, S.H. Zhong, X.M. Sun, "Steganalysis of information hidden in webpage based on higher-order statistics", Proceedings of the International Symposium on Electronic Commerce and Security, ISECS 2008, Guangzhou, China, pp.957–960, 2008.
[27]M. Chapman, G.I. Davida, M. Rennhard, "A practical and effective approach to large scale automated linguistic steganography", The 4th International Conference on Information and Communications Security, Venice, Italy, pp.156–165, 2007.
[28]Z.L. Chen, L.S. Huang, Z.Z. Yu, W. Yang, L.J. Li, X.L. Zheng, X.X. Zhao, "Linguistic steganography detection using statistical characteristics of correlations between words", The 11th International Workshop on Information Hiding, Darmstadt, Germany, pp.224–235, 2008.
[29]Z.L. Chen, L.S. Huang, Z.S. Yu, X.X. Zhao, X.L. Zheng, "Effective linguistic steganography detection", The 8th IEEE International Conference on Computer and Information Technology Workshops, Sydney, Australia, pp.224–229, 2008.
[30]Z.L. Chen, L.S. Huang, Z.S. Yu, L.J. Li, W. Yang, "A statistical algorithm for linguistic steganography detection based on distribution of words", The 3rd International Conference on Availability, Security, and Reliability, Barcelona, Spain, pp.558–563, 2008.
[31]C.M. Taskiran, U. Topkara, M. Topkara, E.J. Delp, "Attacks on lexical natural language steganography systems", Proceedings of SPIE International Society for Optical Engineering, Society of Photo-Optical Instrumentation Engineers, San Jose, USA, pp.97–105, 2006.
[32]K. Bennett, "Linguistic steganography: Survey, analysis, and robustness concerns for hiding information in text", Purdue University, Indiana, USA, 2004.
[33]YANG Hao and CAO Xianbin " Linguistic Steganalysis Based on Meta Features and Immune Mechanism "Chinese Journal of Electronics,Vol.19, No.4, Oct. 2010.
[34]Lingyun Xiang, Xingming Sun, Gang Luo, Can Gan. "Research on Steganalysis for Text Steganography Based on Font Format", The Third International Symposium on Information Assurance and Security (IAS 2007), Manchester, United Kingdom , August 2007.
[35]MOMENTS IN IMAGE PROCESSING Bob Bailey Nov. 2002.
[36]Available online: http://home.tele2.at/wbailer/wbstego/wbs4devdoc .html.
[37]Available online: http://www.darkside.com.au/snow/.
[38]Indradip Banerjee, Souvik Bhattacharyya and Gautam Sanyal. "Novel text steganography through special code generation." In Proceedings of International Conference on Systemics,Cybernetics and Informatics (ICSCI-2011), Hyderabad,India., Jan 5-8, 2011.
[39]Indradip Banerjee, Souvik Bhattacharyya and Gautam Sanyal. "The text steganography using article mapping technique(AMT) and SSCE". Journal of Global Research in Computer Science, 2, April 2011.
[40]Souvik Bhattacharyya, Indradip Banerjee and Gautam Sanyal. Design and implementation of a secure text based steganography model. In 9th annual Conference on Security and Management (SAM) under The 2010 World Congress in Computer Science,Computer Engineering and Applied Computing(WorldComp 2010), LasVegas,USA, July 12-15,2010.
[41]Souvik Bhattacharyya, Indradip Banerjee and Gautam Sanyal. Implementation of a novel text based steganography model. In National Conference on Computing and Systems (NACCS), Dept. of Computer Science, The University of Burdwan, Burdwan,India., Jan 29, 2010.
[42]Souvik Bhattacharyya, Indradip Banerjee and Gautam Sanyal. A novel approach of secure text based steganography model using word mapping method(WMM). International Journal of Computer and Information Engineering 4:2 2010 - World Academy of Science, Engineering and Technology (WASET), 4:96103, Spring 2010.
[43]Souvik Bhattacharyya, Indradip Banerjee, Arka Prokash Mazumdar and Gautam Sanyal. Text steganography using formatting character spacing. IJICS, 13, Decembar, 2010.
[44]Souvik Bhattacharyya, Indradip Banerjee and Gautam Sanyal. A survey of steganography and steganalysis technique in image, text, audio and video as cover carrier. Journal of Global Research in Computer Science, 2, April 2011.
[45]Indradip Banerjee, Souvik Bhattacharyya and Gautam Sanyal. An Approach of Quantum Steganography through Special SSCE Code. International Journal of Computer and Information Engineering - World Academy of Science, Engineering and Technology (WASET), Issue 0080:2011, Article 175, Page: 939-946.
[46]Indradip Banerjee, Souvik Bhattacharyya and Gautam Sanyal. Text Steganography through Quantum Approach. In Journal on Wireless Networks And Computational Intelligence, Communications in Computer and Information Science, 2012, Volume 292, Part 7, 632-643, DOI: 10.1007/978-3-642-31686-9_74 Springer-Verlag Berlin Heidelberg 2012.
[47]Indradip Banerjee, Souvik Bhattacharyya and Gautam Sanyal. "A Procedure of Text Steganography Using Indian Regional Language" Journal on "I. J. Computer Network and Information Security, 2012, v. 8, p. 65-73" Published Online August 2012 in MECS.