Low-Tech Steganography for Covert Operations

Full Text (PDF, 485KB), PP.18-30

Views: 0 Downloads: 0

Author(s)

Akash Nag 1,*

1. Department of Computer Science, M.U.C. Women’s College, Burdwan 713104, WB, India

* Corresponding author.

DOI: https://doi.org/10.5815/ijmsc.2019.01.02

Received: 21 Apr. 2018 / Revised: 29 Jun. 2018 / Accepted: 9 Aug. 2018 / Published: 8 Jan. 2019

Index Terms

Low-Tech Steganography, Text Steganography, cover generation, espionage, under-cover journalism

Abstract

Text steganography, the art of concealing a secret text inside another innocuous text called the cover, is usually performed by insertion of whitespace, punctuation marks, misspelling words, or by arbitrarily capitalizing words or inserting synonyms, changing font-sizes & colors, etc. All of these have the disadvantage that they either arouse suspicion or are easily noticeable; and even lost if manually copied, i.e. handwritten. Furthermore, they are easily detectable by automated checkers. Still there are other methods which require a stego-key in order to decrypt the message. In covert intelligence operations, transmission of the stego-key may not be possible at all, more so when the message is urgent. Digital communications and Internet connectivity may also be lacking in certain situations, and the only mode of message passing available may be the exchange of handwritten text on paper; which effectively rules out text modifications like font-changes, whitespace insertion, etc. or any form of digital steganography like image/audio steganography. Finally, in almost all text-steganographic techniques, there is no provision to for the receiver to detect whether or not there is indeed any message embedded. This is very important in intelligence operations where a number of decoy text need to be sent with only one concealing the actual message. In this paper, we propose a new tool called STEGASSIST that can help the sender in generating the stego-text manually. It is a low-tech form of steganography that is especially suited to covert operations like espionage or under-cover journalism. In this method, the generated cover and the stego-text are identical, or in other words, there is no cover-text. Moreover, decryption does not require a stego-key, and the stego-text may be printed or even hand-written and sent via unreliable messengers, or published, without arousing any suspicion. Finally, the received stego-text can be checked by the receiver to detect whether or not there is any actual message embedded in it.

Cite This Paper

Akash Nag,"Low-Tech Steganography for Covert Operations", International Journal of Mathematical Sciences and Computing (IJMSC), Vol.5, No.1, pp.18-30, 2019. DOI: 10.5815/ijmsc.2019.01.02

Reference

[1]M. Conway, "Code wars: Steganography, signals intelligence, and terrorism," Knowledge, Technology and Policy (Special issue entitled: Technology and Terrorism), vol. 16, no. 2, pp. 45-62, 2003.

[2]D. Denning and W. E. Baugh, "Hiding crimes in cyberspace," in Crypto Anarchy, Cyberstates, and Pirate Utopias (P. Ludlow, ed.), Cambridge MA: MIT Press, 2001.

[3]"The encrypted jihad." http://www.salon.com/tech/feature/2002/02/04/terror encryption/, 2002. Online; retrieved on 30 March 2018.

[4]W. Bender, D. Gruhl, N. Morimoto, and A. Lu, "Techniques for data hiding," IBM Systems Journal, vol. 35, no. 3,4, pp. 313-335, 1996.

[5]M. Kwan, "The snow home page." http://www.darkside.com.au/snow/, 1998. Online; Retrieved on 20 March 2018.

[6]L. Y. Por, T. F. Ang, and B. Delina, "Whitesteg: a new scheme in information hiding using text steganography," WSEAS Transactions on Computers, vol. 7, no. 6, pp. 735-745, 2008.

[7]R. S. R. Prasad and K. Alla, "A new approach to telegu text steganography," in IEEE Symposium on Wireless Technology and Applications, IEEE, 2011.

[8]I. Banerjee, S. Bhattacharyya, and G. Sanyal, "Novel text steganography through special code generation," in Proceedings of the International Conference on Systemics, Cybernetics and Informatics, 2011.

[9]M. Shirali-Shahreza, "Text steganography by changing words spellings" in Proceedings of the 10th International Conference on Advanced Communication Technology, vol. 3, IEEE, 2008.

[10]M. D. Khairullah, "A novel text steganography system using font color of the invisible characters in Microsoft Word documents," in Proceedings of the 2nd International Conference on Computer and Electrical Engineering, vol. 1, IEEE, 2009.

[11]S. Roy and M. Manasmita, "A novel approach to format based text steganography," in Proceedings of the International Conference on Communication, Computing & Security, ACM, 2011.

[12]M. H. Shirali-Shahreza and M. Shirali-Shahreza, "A new approach to Persian/Arabic text steganography," in Proceedings of the 5th IEEE/ACIS International Workshop on Component-Based Software Engineering, Software Architecture and Reuse, Computer and Information Science, IEEE, 2006.

[13]M. Chapman, G. I. Davida, and M. Rennhard, "A practical and effective approach to large-scale automated linguistic steganography," in Proceedings of the International Conference on Information Security, Springer, 2001.

[14]M. H. Shirali-Shahreza and M. Shirali-Shahreza, "A new synonym text steganography," in Proceedings of the IEEE International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IEEE, 2008.

[15]C.-H. Lin and T.-C. Lee, "A confused document encryption scheme and its implementation," Computers & Security, vol. 17, no. 6, pp. 543-551, 1998.

[16]W.-H. Yeh and J.-J. Hwang, "Hiding digital information using a novel system scheme," Computers & Security, vol. 20, no. 6, pp. 533-538, 2001.

[17]K. Bennett, "Linguistic steganography: Survey, analysis, and robustness concerns for hiding information in text," CERIAS Technical Report, 2004.

[18]N. F. Johnson, Z. Duric, and S. Jajodia, Information Hiding: Steganography and Watermarking - Attacks and Countermeasures, ch. 1, p. 4. Advances in Information Security, Springer, 2001.

[19]D. Kahn, The Codebreakers. Macmillan, 2nd ed., 1996.

[20]B. Schneier, "Description of a new variable-length key, 64-bit block cipher (BlowFish)," in Proceedings of the Cambridge Security Workshop on Fast Software Encryption, pp. 191-204, Springer-Verlag, 1993.

[21]W. E. Winkler, "The state of record linkage and current research problems," Statistics of Income Division, Internal Revenue Service Publication R99/04, 1999.

[22]R. Anderson, R. Needham, and A. Shamir, "The steganographic File system," in Proceedings of the 2nd International Workshop in Information Hiding (D. Aucsmith, ed.), vol. 1525 of Lecture Notes in Computer Science, Springer-Verlag, 1998.

[23]T. G. Handel and M. T. Stanford, "Hiding data in the OSI network model," in Proceedings of the 1st International Workshop on Information Hiding (R. Anderson, ed.), vol. 1174 of Lecture Notes in Computer Science, pp. 23-38, Springer-Verlag, 1996.

[24]C. H. Rowland, "Covert channels in the TCP/IP protocol suite," 1996.

[25]J. Lach, W. H. Mangione-Smith, and M. Potkonjak, "Fingerprinting digital circuits on programmable hardware," in Proceedings of the 2nd International Workshop on Information Hiding (D. Aucsmith, ed.), vol. 1525 of Lecture Notes in Computer Science, Springer-Verlag, 1998.

[26]J. Lach, W. H. Mangione-Smith, and M. Potkonjak, "Enhanced intellectual property protection for digital circuits on programmable hardware,"in Proceedings of the 3rd International Workshop on Information Hiding (A. Pfitzmann, ed.), vol. 1768 of Lecture Notes in Computer Science, Springer-Verlag, 2000.