Skip to main content
Top
Published in: Wireless Personal Communications 2/2018

23-05-2018

Multilayer Partially Homomorphic Encryption Text Steganography (MLPHE-TS): A Zero Steganography Approach

Authors: Nuzhat Naqvi, Aliya Tabassum Abbasi, Rasheed Hussain, M. Aihab Khan, Basheer Ahmad

Published in: Wireless Personal Communications | Issue 2/2018

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

This paper presents a Multilayer Partially Homomorphic Encryption Text Steganography, an invisible approach for covert communication. Existing text-based schemes are either successive in obtaining high concealing capacity, imperceptibility or robusrnes, but failed to achieve the balance between these conflicting parameters. To fill the gaps, we propose a new steganography scheme that successfully addresses the limitations of existing schemes. To achieve high hidden capacity, instead of using conventional secret stream embedding process, we substitute character of secret message with the cover message. Conversion of the multi-variate secret message into alphabets through the alphabetic transformation process is another additive characteristic of our proposed method which resolves the problem of cover message selection. Our proposed scheme is a blind embedding scheme that replaces a character of secret message with a character of cover message and hence-forth makes it zero-perceptible. Furthermore, robustness is achieved through implanting multilayer encoding concept where block encoding, use of partially homomorphic encryption, and alphabetic transformation provide multilayer security to secret message before its actual embedding. This multilayer encryption process also assists in the reduction of secret message size thus creating more space for concealment. Additionally, key generation process is also improved by employing identical range for the selection of both prime numbers in partially homomorphic algorithm to generate public and private keys for encryption process. We compared our scheme with the existing schemes to evaluate capacity, imperceptibility and robustness of the proposed method. Experimental results demonstrate that all identified issues of text steganography are successfully addressed and our proposed scheme outperforms the existing similar steganographic mechanisms.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
2.
go back to reference Roy, S. & Manasmita, M. (2011). A novel approach to format based text steganography. In ICCCS’11: Proceedings of the 2011 international conference on communication, computing & security. ACM. Roy, S. & Manasmita, M. (2011). A novel approach to format based text steganography. In ICCCS’11: Proceedings of the 2011 international conference on communication, computing & security. ACM.
5.
go back to reference Altigani, A. (2013). A hybrid approach to secure transmitted message using advanced encryption standard (AES) and word shift coding protocol. In International conference on computing, electrical and electronic engineer (ICCEEE), 26–28 August 2013. Altigani, A. (2013). A hybrid approach to secure transmitted message using advanced encryption standard (AES) and word shift coding protocol. In International conference on computing, electrical and electronic engineer (ICCEEE), 26–28 August 2013.
6.
go back to reference Wang, Z., Chang, C., Lin, C., & Li, M. (2009). A reversible information hiding scheme using left-right and up- down Chinese character representation. Journal of Systems and Software, 82, 1362–1369.CrossRef Wang, Z., Chang, C., Lin, C., & Li, M. (2009). A reversible information hiding scheme using left-right and up- down Chinese character representation. Journal of Systems and Software, 82, 1362–1369.CrossRef
7.
go back to reference Por, L. Y. & Delina, B. (2007). Information hiding: A new approach in text steganography. In 7th WSEAS international conference on applied computers &applied computational science (ACACOS’08), Hangzhou China, April 6–8, 2007, ISBN: 978-960-6766-49-7. Por, L. Y. & Delina, B. (2007). Information hiding: A new approach in text steganography. In 7th WSEAS international conference on applied computers &applied computational science (ACACOS’08), Hangzhou China, April 6–8, 2007, ISBN: 978-960-6766-49-7.
8.
go back to reference Wang, Z. -H. (2009). Emoticon-based text steganography in chat. In Second Asia Pacific conference on computational intelligence and industrial application 978-1-4244-4607-0/09/25.00 ©2009 IEEE wangzhihui1017@yahoo.cn. Wang, Z. -H. (2009). Emoticon-based text steganography in chat. In Second Asia Pacific conference on computational intelligence and industrial application 978-1-4244-4607-0/09/25.00 ©2009 IEEE wangzhihui1017@yahoo.cn.
9.
go back to reference Khairullah, M.D. (2009). A novel text steganography system using font color of the invisible characters in microsoft word. In Second international conference on computer and electrical engineering (ICCEE) (Vol. 1) Documents. Sylhet Bangladesh: Shahjalal University of Science and Technology, 978-0-7695-3925-6/09 26.00 2009. Khairullah, M.D. (2009). A novel text steganography system using font color of the invisible characters in microsoft word. In Second international conference on computer and electrical engineering (ICCEE) (Vol. 1) Documents. Sylhet Bangladesh: Shahjalal University of Science and Technology, 978-0-7695-3925-6/09 26.00 2009.
11.
go back to reference Bhattacharyya, S., Indu, P., Dutta, S., Biswas, A., & Sanyal, G. (2011). Hiding data in text through changing in alphabet letter patterns (CALP). Journal of Global Research in Computer Science, 2(3), 33–39. Bhattacharyya, S., Indu, P., Dutta, S., Biswas, A., & Sanyal, G. (2011). Hiding data in text through changing in alphabet letter patterns (CALP). Journal of Global Research in Computer Science, 2(3), 33–39.
13.
go back to reference Li, X. (2014). A novel blind detector for additive noise steganography in JPEG decompressed images. Multimedia Tools Application, 68, 1051–1068.CrossRef Li, X. (2014). A novel blind detector for additive noise steganography in JPEG decompressed images. Multimedia Tools Application, 68, 1051–1068.CrossRef
14.
go back to reference Khosravi, M. J. (2014). A novel joint secret image sharing and robust steganography method using wavelet. Multimedia Systems, 20, 215–226.CrossRef Khosravi, M. J. (2014). A novel joint secret image sharing and robust steganography method using wavelet. Multimedia Systems, 20, 215–226.CrossRef
17.
go back to reference Tang, S. (2014). Audio steganography with AES for real-time covert voice over internet protocol communications. Science China Information Sciences, 57, 032106:1–032106:14. Tang, S. (2014). Audio steganography with AES for real-time covert voice over internet protocol communications. Science China Information Sciences, 57, 032106:1–032106:14.
20.
go back to reference Sadek, M. M. (2014). Video steganography: A comprehensive review, Multimedia tools application. New York: Springer. Sadek, M. M. (2014). Video steganography: A comprehensive review, Multimedia tools application. New York: Springer.
22.
go back to reference Abbasi, A. T., Naqvi, N. & Khan, A. (2015). Urdu text steganography: Utilizing isolated letters. In 13th Australian information security management conference, held from the 30 November–2 December (pp. 37–46). Perth, Western Australia: Edith Cowan University Joondalup Campus. Abbasi, A. T., Naqvi, N. & Khan, A. (2015). Urdu text steganography: Utilizing isolated letters. In 13th Australian information security management conference, held from the 30 November–2 December (pp. 37–46). Perth, Western Australia: Edith Cowan University Joondalup Campus.
23.
go back to reference Singh, P., Chaudhary, R. & Agarwal, A. (2012). A novel approach of text steganography based on null spaces. IOSR Journal of Computer Engineering, 3(4), 11–17, ISSN: 2278-0661. Singh, P., Chaudhary, R. & Agarwal, A. (2012). A novel approach of text steganography based on null spaces. IOSR Journal of Computer Engineering, 3(4), 11–17, ISSN: 2278-0661.
24.
go back to reference Mohamed, A. (2014). An improved algorithm for information hiding based on features of Arabic text: A unicode approach. Egyptian Informatics Journals-Elsevier, 15, 79–89.CrossRef Mohamed, A. (2014). An improved algorithm for information hiding based on features of Arabic text: A unicode approach. Egyptian Informatics Journals-Elsevier, 15, 79–89.CrossRef
25.
go back to reference Thamaraiselvan, R., & Saradha, A. (2012). A novel approach of hybrid method of hiding the text information using steganography. International Journal of Computational Engineering Research (IJCER), 1(1), ISSN: 2778-5795. Thamaraiselvan, R., & Saradha, A. (2012). A novel approach of hybrid method of hiding the text information using steganography. International Journal of Computational Engineering Research (IJCER), 1(1), ISSN: 2778-5795.
26.
go back to reference Shirali-Shahreza, M. H. & Shirali-Shahreza, M. (2008) A new synonym text steganography. In International conference on intelligent information hiding and multimedia signal processing, 978-0-7695-3278-3/08 $25.00 @ 2008 IEEE. Shirali-Shahreza, M. H. & Shirali-Shahreza, M. (2008) A new synonym text steganography. In International conference on intelligent information hiding and multimedia signal processing, 978-0-7695-3278-3/08 $25.00 @ 2008 IEEE.
27.
go back to reference Naqvi, N., & Khan, A. (2016). Character substitution text steganography: a zero steganography approach. International Journal of Computer Science and Information Security (IJCSIS), 14(9), 235. Naqvi, N., & Khan, A. (2016). Character substitution text steganography: a zero steganography approach. International Journal of Computer Science and Information Security (IJCSIS), 14(9), 235.
28.
go back to reference Lip, Y. P. & Wong, K. S. (2012). UniSpaCh: A text hiding method using unicode space characters. The Journal of System and Software, 85, 1075–1082. 0164-1212/$-see front matter @2011 Elsevier Inc. Lip, Y. P. & Wong, K. S. (2012). UniSpaCh: A text hiding method using unicode space characters. The Journal of System and Software, 85, 1075–1082. 0164-1212/$-see front matter @2011 Elsevier Inc.
30.
go back to reference Wang, F., Huang, L., Chen, Z., Yang, W., & Miao, H. (2013). A novel text steganography, by context based equivalent substitution. In 2013 IEEE international conference on signal processing, communication and computing (ICSPCC) (pp. 1–6). Wang, F., Huang, L., Chen, Z., Yang, W., & Miao, H. (2013). A novel text steganography, by context based equivalent substitution. In 2013 IEEE international conference on signal processing, communication and computing (ICSPCC) (pp. 1–6).
31.
go back to reference Desoky, (2009). Listega: List-based steganography methodology. International Journal of Information Security, 8, 247–261.CrossRef Desoky, (2009). Listega: List-based steganography methodology. International Journal of Information Security, 8, 247–261.CrossRef
33.
go back to reference Shirali-Shahreza, M. H. & Shirali-Shahreza, M. (2006). A new approach to Persian/Arabic text steganography. In 5th IEEE/ACIS international conference on computer and information science (ICISCOMSAR 06) (pp. 310–315). Shirali-Shahreza, M. H. & Shirali-Shahreza, M. (2006). A new approach to Persian/Arabic text steganography. In 5th IEEE/ACIS international conference on computer and information science (ICISCOMSAR 06) (pp. 310–315).
34.
go back to reference Kumar, R., Chand, S. & Singh, S. (2014). An email based high capacity text steganography scheme using combinatorial compression. In 5th IEEE international conference CONFLUENCE 2014: The next generation information technology summit, 25th–26th September, 2014 (pp. 336–339. Kumar, R., Chand, S. & Singh, S. (2014). An email based high capacity text steganography scheme using combinatorial compression. In 5th IEEE international conference CONFLUENCE 2014: The next generation information technology summit, 25th–26th September, 2014 (pp. 336–339.
35.
go back to reference Kumar, R., Chand, S. & Singh, S. (2016). A high capacity Email based text steganography scheme using Huffman compression. In International Conference on Signal Processing and Integrated Networks. Kumar, R., Chand, S. & Singh, S. (2016). A high capacity Email based text steganography scheme using Huffman compression. In International Conference on Signal Processing and Integrated Networks.
36.
go back to reference Malik, A., Sikka, G., & Verma, H. K. (2017). A high capacity text steganography scheme based on LZW compression and color coding. An International Journal Engineering Science and Technology, 20, 72–79.CrossRef Malik, A., Sikka, G., & Verma, H. K. (2017). A high capacity text steganography scheme based on LZW compression and color coding. An International Journal Engineering Science and Technology, 20, 72–79.CrossRef
37.
go back to reference Lu, R. (2016). Homomorphic public key encryption techniques. In Privacy-enhancing aggregation techniques for smart grid communications part of the series wireless networks. Berlin: Springer (pp. 13–40). Lu, R. (2016). Homomorphic public key encryption techniques. In Privacy-enhancing aggregation techniques for smart grid communications part of the series wireless networks. Berlin: Springer (pp. 13–40).
38.
go back to reference Htet, M., & Phyo, S. W. (2015). A new embedding algorithm for data security. In International conference on data mining, electronics and information technology (DMEIT’15), Pattaya, Thailand, August 10–11. Htet, M., & Phyo, S. W. (2015). A new embedding algorithm for data security. In International conference on data mining, electronics and information technology (DMEIT’15), Pattaya, Thailand, August 10–11.
Metadata
Title
Multilayer Partially Homomorphic Encryption Text Steganography (MLPHE-TS): A Zero Steganography Approach
Authors
Nuzhat Naqvi
Aliya Tabassum Abbasi
Rasheed Hussain
M. Aihab Khan
Basheer Ahmad
Publication date
23-05-2018
Publisher
Springer US
Published in
Wireless Personal Communications / Issue 2/2018
Print ISSN: 0929-6212
Electronic ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-018-5868-1

Other articles of this Issue 2/2018

Wireless Personal Communications 2/2018 Go to the issue