Skip to main content
Erschienen in: Wireless Personal Communications 2/2018

23.05.2018

Multilayer Partially Homomorphic Encryption Text Steganography (MLPHE-TS): A Zero Steganography Approach

verfasst von: Nuzhat Naqvi, Aliya Tabassum Abbasi, Rasheed Hussain, M. Aihab Khan, Basheer Ahmad

Erschienen in: Wireless Personal Communications | Ausgabe 2/2018

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

This paper presents a Multilayer Partially Homomorphic Encryption Text Steganography, an invisible approach for covert communication. Existing text-based schemes are either successive in obtaining high concealing capacity, imperceptibility or robusrnes, but failed to achieve the balance between these conflicting parameters. To fill the gaps, we propose a new steganography scheme that successfully addresses the limitations of existing schemes. To achieve high hidden capacity, instead of using conventional secret stream embedding process, we substitute character of secret message with the cover message. Conversion of the multi-variate secret message into alphabets through the alphabetic transformation process is another additive characteristic of our proposed method which resolves the problem of cover message selection. Our proposed scheme is a blind embedding scheme that replaces a character of secret message with a character of cover message and hence-forth makes it zero-perceptible. Furthermore, robustness is achieved through implanting multilayer encoding concept where block encoding, use of partially homomorphic encryption, and alphabetic transformation provide multilayer security to secret message before its actual embedding. This multilayer encryption process also assists in the reduction of secret message size thus creating more space for concealment. Additionally, key generation process is also improved by employing identical range for the selection of both prime numbers in partially homomorphic algorithm to generate public and private keys for encryption process. We compared our scheme with the existing schemes to evaluate capacity, imperceptibility and robustness of the proposed method. Experimental results demonstrate that all identified issues of text steganography are successfully addressed and our proposed scheme outperforms the existing similar steganographic mechanisms.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
2.
Zurück zum Zitat Roy, S. & Manasmita, M. (2011). A novel approach to format based text steganography. In ICCCS’11: Proceedings of the 2011 international conference on communication, computing & security. ACM. Roy, S. & Manasmita, M. (2011). A novel approach to format based text steganography. In ICCCS’11: Proceedings of the 2011 international conference on communication, computing & security. ACM.
5.
Zurück zum Zitat Altigani, A. (2013). A hybrid approach to secure transmitted message using advanced encryption standard (AES) and word shift coding protocol. In International conference on computing, electrical and electronic engineer (ICCEEE), 26–28 August 2013. Altigani, A. (2013). A hybrid approach to secure transmitted message using advanced encryption standard (AES) and word shift coding protocol. In International conference on computing, electrical and electronic engineer (ICCEEE), 26–28 August 2013.
6.
Zurück zum Zitat Wang, Z., Chang, C., Lin, C., & Li, M. (2009). A reversible information hiding scheme using left-right and up- down Chinese character representation. Journal of Systems and Software, 82, 1362–1369.CrossRef Wang, Z., Chang, C., Lin, C., & Li, M. (2009). A reversible information hiding scheme using left-right and up- down Chinese character representation. Journal of Systems and Software, 82, 1362–1369.CrossRef
7.
Zurück zum Zitat Por, L. Y. & Delina, B. (2007). Information hiding: A new approach in text steganography. In 7th WSEAS international conference on applied computers &applied computational science (ACACOS’08), Hangzhou China, April 6–8, 2007, ISBN: 978-960-6766-49-7. Por, L. Y. & Delina, B. (2007). Information hiding: A new approach in text steganography. In 7th WSEAS international conference on applied computers &applied computational science (ACACOS’08), Hangzhou China, April 6–8, 2007, ISBN: 978-960-6766-49-7.
8.
Zurück zum Zitat Wang, Z. -H. (2009). Emoticon-based text steganography in chat. In Second Asia Pacific conference on computational intelligence and industrial application 978-1-4244-4607-0/09/25.00 ©2009 IEEE wangzhihui1017@yahoo.cn. Wang, Z. -H. (2009). Emoticon-based text steganography in chat. In Second Asia Pacific conference on computational intelligence and industrial application 978-1-4244-4607-0/09/25.00 ©2009 IEEE wangzhihui1017@yahoo.cn.
9.
Zurück zum Zitat Khairullah, M.D. (2009). A novel text steganography system using font color of the invisible characters in microsoft word. In Second international conference on computer and electrical engineering (ICCEE) (Vol. 1) Documents. Sylhet Bangladesh: Shahjalal University of Science and Technology, 978-0-7695-3925-6/09 26.00 2009. Khairullah, M.D. (2009). A novel text steganography system using font color of the invisible characters in microsoft word. In Second international conference on computer and electrical engineering (ICCEE) (Vol. 1) Documents. Sylhet Bangladesh: Shahjalal University of Science and Technology, 978-0-7695-3925-6/09 26.00 2009.
10.
11.
Zurück zum Zitat Bhattacharyya, S., Indu, P., Dutta, S., Biswas, A., & Sanyal, G. (2011). Hiding data in text through changing in alphabet letter patterns (CALP). Journal of Global Research in Computer Science, 2(3), 33–39. Bhattacharyya, S., Indu, P., Dutta, S., Biswas, A., & Sanyal, G. (2011). Hiding data in text through changing in alphabet letter patterns (CALP). Journal of Global Research in Computer Science, 2(3), 33–39.
13.
Zurück zum Zitat Li, X. (2014). A novel blind detector for additive noise steganography in JPEG decompressed images. Multimedia Tools Application, 68, 1051–1068.CrossRef Li, X. (2014). A novel blind detector for additive noise steganography in JPEG decompressed images. Multimedia Tools Application, 68, 1051–1068.CrossRef
14.
Zurück zum Zitat Khosravi, M. J. (2014). A novel joint secret image sharing and robust steganography method using wavelet. Multimedia Systems, 20, 215–226.CrossRef Khosravi, M. J. (2014). A novel joint secret image sharing and robust steganography method using wavelet. Multimedia Systems, 20, 215–226.CrossRef
15.
17.
Zurück zum Zitat Tang, S. (2014). Audio steganography with AES for real-time covert voice over internet protocol communications. Science China Information Sciences, 57, 032106:1–032106:14. Tang, S. (2014). Audio steganography with AES for real-time covert voice over internet protocol communications. Science China Information Sciences, 57, 032106:1–032106:14.
20.
Zurück zum Zitat Sadek, M. M. (2014). Video steganography: A comprehensive review, Multimedia tools application. New York: Springer. Sadek, M. M. (2014). Video steganography: A comprehensive review, Multimedia tools application. New York: Springer.
22.
Zurück zum Zitat Abbasi, A. T., Naqvi, N. & Khan, A. (2015). Urdu text steganography: Utilizing isolated letters. In 13th Australian information security management conference, held from the 30 November–2 December (pp. 37–46). Perth, Western Australia: Edith Cowan University Joondalup Campus. Abbasi, A. T., Naqvi, N. & Khan, A. (2015). Urdu text steganography: Utilizing isolated letters. In 13th Australian information security management conference, held from the 30 November–2 December (pp. 37–46). Perth, Western Australia: Edith Cowan University Joondalup Campus.
23.
Zurück zum Zitat Singh, P., Chaudhary, R. & Agarwal, A. (2012). A novel approach of text steganography based on null spaces. IOSR Journal of Computer Engineering, 3(4), 11–17, ISSN: 2278-0661. Singh, P., Chaudhary, R. & Agarwal, A. (2012). A novel approach of text steganography based on null spaces. IOSR Journal of Computer Engineering, 3(4), 11–17, ISSN: 2278-0661.
24.
Zurück zum Zitat Mohamed, A. (2014). An improved algorithm for information hiding based on features of Arabic text: A unicode approach. Egyptian Informatics Journals-Elsevier, 15, 79–89.CrossRef Mohamed, A. (2014). An improved algorithm for information hiding based on features of Arabic text: A unicode approach. Egyptian Informatics Journals-Elsevier, 15, 79–89.CrossRef
25.
Zurück zum Zitat Thamaraiselvan, R., & Saradha, A. (2012). A novel approach of hybrid method of hiding the text information using steganography. International Journal of Computational Engineering Research (IJCER), 1(1), ISSN: 2778-5795. Thamaraiselvan, R., & Saradha, A. (2012). A novel approach of hybrid method of hiding the text information using steganography. International Journal of Computational Engineering Research (IJCER), 1(1), ISSN: 2778-5795.
26.
Zurück zum Zitat Shirali-Shahreza, M. H. & Shirali-Shahreza, M. (2008) A new synonym text steganography. In International conference on intelligent information hiding and multimedia signal processing, 978-0-7695-3278-3/08 $25.00 @ 2008 IEEE. Shirali-Shahreza, M. H. & Shirali-Shahreza, M. (2008) A new synonym text steganography. In International conference on intelligent information hiding and multimedia signal processing, 978-0-7695-3278-3/08 $25.00 @ 2008 IEEE.
27.
Zurück zum Zitat Naqvi, N., & Khan, A. (2016). Character substitution text steganography: a zero steganography approach. International Journal of Computer Science and Information Security (IJCSIS), 14(9), 235. Naqvi, N., & Khan, A. (2016). Character substitution text steganography: a zero steganography approach. International Journal of Computer Science and Information Security (IJCSIS), 14(9), 235.
28.
Zurück zum Zitat Lip, Y. P. & Wong, K. S. (2012). UniSpaCh: A text hiding method using unicode space characters. The Journal of System and Software, 85, 1075–1082. 0164-1212/$-see front matter @2011 Elsevier Inc. Lip, Y. P. & Wong, K. S. (2012). UniSpaCh: A text hiding method using unicode space characters. The Journal of System and Software, 85, 1075–1082. 0164-1212/$-see front matter @2011 Elsevier Inc.
30.
Zurück zum Zitat Wang, F., Huang, L., Chen, Z., Yang, W., & Miao, H. (2013). A novel text steganography, by context based equivalent substitution. In 2013 IEEE international conference on signal processing, communication and computing (ICSPCC) (pp. 1–6). Wang, F., Huang, L., Chen, Z., Yang, W., & Miao, H. (2013). A novel text steganography, by context based equivalent substitution. In 2013 IEEE international conference on signal processing, communication and computing (ICSPCC) (pp. 1–6).
31.
Zurück zum Zitat Desoky, (2009). Listega: List-based steganography methodology. International Journal of Information Security, 8, 247–261.CrossRef Desoky, (2009). Listega: List-based steganography methodology. International Journal of Information Security, 8, 247–261.CrossRef
33.
Zurück zum Zitat Shirali-Shahreza, M. H. & Shirali-Shahreza, M. (2006). A new approach to Persian/Arabic text steganography. In 5th IEEE/ACIS international conference on computer and information science (ICISCOMSAR 06) (pp. 310–315). Shirali-Shahreza, M. H. & Shirali-Shahreza, M. (2006). A new approach to Persian/Arabic text steganography. In 5th IEEE/ACIS international conference on computer and information science (ICISCOMSAR 06) (pp. 310–315).
34.
Zurück zum Zitat Kumar, R., Chand, S. & Singh, S. (2014). An email based high capacity text steganography scheme using combinatorial compression. In 5th IEEE international conference CONFLUENCE 2014: The next generation information technology summit, 25th–26th September, 2014 (pp. 336–339. Kumar, R., Chand, S. & Singh, S. (2014). An email based high capacity text steganography scheme using combinatorial compression. In 5th IEEE international conference CONFLUENCE 2014: The next generation information technology summit, 25th–26th September, 2014 (pp. 336–339.
35.
Zurück zum Zitat Kumar, R., Chand, S. & Singh, S. (2016). A high capacity Email based text steganography scheme using Huffman compression. In International Conference on Signal Processing and Integrated Networks. Kumar, R., Chand, S. & Singh, S. (2016). A high capacity Email based text steganography scheme using Huffman compression. In International Conference on Signal Processing and Integrated Networks.
36.
Zurück zum Zitat Malik, A., Sikka, G., & Verma, H. K. (2017). A high capacity text steganography scheme based on LZW compression and color coding. An International Journal Engineering Science and Technology, 20, 72–79.CrossRef Malik, A., Sikka, G., & Verma, H. K. (2017). A high capacity text steganography scheme based on LZW compression and color coding. An International Journal Engineering Science and Technology, 20, 72–79.CrossRef
37.
Zurück zum Zitat Lu, R. (2016). Homomorphic public key encryption techniques. In Privacy-enhancing aggregation techniques for smart grid communications part of the series wireless networks. Berlin: Springer (pp. 13–40). Lu, R. (2016). Homomorphic public key encryption techniques. In Privacy-enhancing aggregation techniques for smart grid communications part of the series wireless networks. Berlin: Springer (pp. 13–40).
38.
Zurück zum Zitat Htet, M., & Phyo, S. W. (2015). A new embedding algorithm for data security. In International conference on data mining, electronics and information technology (DMEIT’15), Pattaya, Thailand, August 10–11. Htet, M., & Phyo, S. W. (2015). A new embedding algorithm for data security. In International conference on data mining, electronics and information technology (DMEIT’15), Pattaya, Thailand, August 10–11.
Metadaten
Titel
Multilayer Partially Homomorphic Encryption Text Steganography (MLPHE-TS): A Zero Steganography Approach
verfasst von
Nuzhat Naqvi
Aliya Tabassum Abbasi
Rasheed Hussain
M. Aihab Khan
Basheer Ahmad
Publikationsdatum
23.05.2018
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 2/2018
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-018-5868-1

Weitere Artikel der Ausgabe 2/2018

Wireless Personal Communications 2/2018 Zur Ausgabe

Neuer Inhalt