Article information

2019 , Volume 24, ¹ 3, p.75-87

Nechta I.V.

A method of steganographic message transformation with the partial antidisturbance property

Purpose. This article addresses the development of a new method for embedding hidden messages in various containers (text, executable files).

Methods. During this research the methods of information theory, probability theory and mathematical statistics are used. Efficiency analysis of the new method was carried out by using the Chi-square test.

Results. A new method of steganographic transformation of a binary message, which allows to embed hidden data is presented. It is proposed to transform a message taken from an empty container. The original message is considered as a set of twobit elements. A sequence of non-repeating elements, called series, is used to embed a secret message. Embedding was performed by permutations of elements within the series. The proposed algorithm allows simulating statistical features of a message taken from an empty container, which reduces the probability of successful stegoanalysis. A stegoanalyst who does not know some secret parameter cannot correctly extract the message from the suspicious container and analyze its statistical properties. Thus, the steganalysis approach, based on detection statistical differences in a message taken from an empty and filled container, becomes ineffective.

Conclusions. The new method of steganographic message transformation of an empty container allows embedding hidden information, with minimal distortion of the statistical properties of the original container. In the course of the experiment statistical properties of the message taken from container before and after embedding were investigated. The analysis was carried out using previously known methods of steganalysis, based on detecting statistical differences in messages taken from empty and filled containers. It is shown that without knowing a certain secret parameter, the stegoanalyst cannot correctly extract up to 32% of the message bits from the container, which leads to significant errors in the stegoanalysis. The volume of the message being embedded is 19% of the length of the original message in the empty container. The algorithm presented in this paper is recommended to employ for embedding into containers: text, audio, executable files, graph containers. Using of this algorithm for images is not accounted for.

[full text] [link to elibrary.ru]

Keywords: steganography, stegoanalysis, secret data transmission, antidisturbance

doi: 10.25743/ICT.2019.24.3.006

Author(s):
Nechta Ivan Vasilievich
PhD. , Associate Professor
Position: Head of department
Office: Siberian state university of telecommunications and information sciences
Address: 630102, Russia, Novosibirsk
Phone Office: (383)269-83-59
E-mail: ivannechta@gmail.com
SPIN-code: 9054-8684

References:
[1] Zhang, W., Zhang, X., Wang, S. A double layered “plus-minus one” data embedding scheme. IEEE Signal Processing Letters. 2007; 14(11): 848–851.

[2] Winstein, K. Lexical Steganography. Available at: http://web.mit.edu/keithw/tlex/ (accessed 14.01.2018).

[3] Thorpe, D. Development System with Methodology Providing Information Hiding in Executable Programs. US Patent 20060136875. 2006: 17.

[4] Koluguri, A., Gouse, S., Reddy, P. B. Text steganography methods and its tools. International Journal of Advanced Scientific and Technical Research. 2014; 2(4): 888–902.

[5] Subhedar, M. S., Mankar, V. H. Current status and key issues in image steganography: A Survey. Computer science review. 2014; (13):95–113.

[6] Nechta, I.V. Applying statistical methods for secret message detection in text data. Vestnik SibGUTI. 2012; (1):23-29. (In Russ.)

[7] Nechta, I.V. New method of steganalysis for text data obtained by synonym run-length encoding // Bezopasnost‘ Informatsionnykh Tekhnologiy. 2018. Vol. 25, No. 2. P. 114–120. (In Russ.)

[8] Xiang, L., Wang, X., Yang, C., Liu, P. A novel linguistic steganography based on synonym run-length encoding. IEICE transactions on Information and Systems. 2017; 100(2):313–322.

[9] Nechta, I.V. Method of secret messages embedding into executable files. Vestnik SibGUTI. 2011; 2(3–10). (In Russ.)

[10] Luo, X., Song, X., Li, X., Zhang, W., Lu, J., Yang, C., Liu, F. Steganalysis of HUGO steganography based on parameter recognition of syndrome-trellis-codes. Multimedia Tools and Applications. 2016; 75(21):13557–13583.

[11] Nechta, I.V. Effective method of steganalysis of executable files based on Huffman code. Vestnik SibGUTI. 2010; (4):47–54. (In Russ.)

[12] Official website .Gutenberg Project. Available at: http://www.gutenberg.org/wiki/Main_Page (accessed 11.06.2018).

[13] Nechta, I.V. A method of hidden messages embedding in graphlike structures of a social network. Computational Technologies. 2018; 23(2):55–62.

Bibliography link:
Nechta I.V. A method of steganographic message transformation with the partial antidisturbance property // Computational technologies. 2019. V. 24. ¹ 3. P. 75-87
Home| Scope| Editorial Board| Content| Search| Subscription| Rules| Contacts
ISSN 1560-7534
© 2024 FRC ICT