Steganography-Based Secret and Reliable Communications: Improving Steganographic Capacity and Imperceptibility

Total Page:16

File Type:pdf, Size:1020Kb

Steganography-Based Secret and Reliable Communications: Improving Steganographic Capacity and Imperceptibility CORE Metadata, citation and similar papers at core.ac.uk Provided by Brunel University Research Archive Steganography-Based Secret and Reliable Communications: Improving Steganographic Capacity and Imperceptibility A thesis submitted for the degree of Doctor of Philosophy by Adel Almohammad Department of Information Systems and Computing Brunel University August, 2010 ABSTRACT Unlike encryption, steganography hides the very existence of secret information rather than hiding its meaning only. Image based steganography is the most common system used since digital images are widely used over the Internet and Web. However, the capacity is mostly limited and restricted by the size of cover images. In addition, there is a tradeoff between both steganographic capacity and stego image quality. Therefore, increasing steganographic capacity and enhancing stego image quality are still challenges, and this is exactly our research main aim. Related to this, we also investigate hiding secret information in communication protocols, namely Simple Object Access Protocol (SOAP) message, rather than in conventional digital files. To get a high steganographic capacity, two novel steganography methods were proposed. The first method was based on using 16x16 non-overlapping blocks and quantisation table for Joint Photographic Experts Group (JPEG) compression instead of 8x8. Then, the quality of JPEG stego images was enhanced by using optimised quantisation tables instead of the default tables. The second method, the hybrid method, was based on using optimised quantisation tables and two hiding techniques: JSteg along with our first proposed method. To increase the steganographic capacity, the impact of hiding data within image chrominance was investigated and explained. Since peak signal-to-noise ratio (PSNR) is extensively used as a quality measure of stego images, the reliability of PSNR for stego images was also evaluated in the work described in this thesis. Finally, to eliminate any detectable traces that traditional steganography may leave in stego files, a novel and undetectable steganography method based on SOAP messages was proposed. All methods proposed have been empirically validated as to indicate their utility and value. The results revealed that our methods and suggestions improved the main aspects of image steganography. Nevertheless, PSNR was found not to be a reliable quality evaluation measure to be used with stego image. On the other hand, information hiding in SOAP messages represented a distinctive way for undetectable and secret communication. I DEDICATION This thesis is dedicated, with deepest love and everlasting respect, to numerous precious persons. To my parents for their continuous love, support and encouragement which helped me to achieve my dream. To my wife and daughter who I am indebted to, without their continuous sacrifices and patience the completion of this project could not be possible. To my brothers and all my friends, for their support and patience throughout these stressful years. To the principles of each and every ambitious person who knows that patience and hard work make the dreams. With my love… Adel Almohammad 10 Ramadan, 1431 20 August, 2010 II ACKNOWLEDGEMENTS Firstly, all praise is due to Allah (Glorified and Exalted is He), without his immeasurable blessings and favours none of this could have been possible. During the course of this research, there have been numerous people who have provided me with guidance, inspiration and support for completing this thesis. I am indebted to my supervisor Dr. George Ghinea for his continuous encouragement and support at all stages of this research. His involvement proved vital to the completion of this thesis. I would like to thank him for his useful and valuable advice. I also owe thanks to Professor Robert M. Hierons, my second supervisor, for his insightful and encouraging comments and suggestions throughout this research. On the personal front, I would like to express my gratitude to my family, for their continuous love, support and sincere prayers during the course of this research. I must also express my thanks to all my colleagues in the Department of Information Systems and Computing at Brunel University. I will also like to thank my friends and other participants who helped me a lot by participating and motivating me in the course of my research. Lastly but not the least, I will like to thank the Ministry of Higher Education in Syria and the University of Aleppo for providing me a chance and funding to keep this research going. III DECLARATION The following papers have been published (or have been submitted for publication) as a direct result of the research discussed in this thesis: Journals: 1. Almohammad, A., and Ghinea, G., (2010). Stego Image Quality: Objective and Subjective Perspectives. Submitted to IEEE Transactions on Image Processing, IEEE . 2. Almohammad, A., and Ghinea, G., (2010). Information Hiding in Grayscale and Colour Images. Submitted to Signal Processing: Image Communication, Elsevier. Reviewed Conferences: 1. Alrouh, B., Almohammad, A., and Ghinea, G., (2010). Information Hiding and SOAP Messages. The 5th International Conference for Internet Technology and Secured Transactions (ICITST 2010), London, UK, 8-11 November, 2010, (Accepted), IEEE. 2. Almohammad, A., and Ghinea, G., (2010). Stego Image Quality and the Reliability of PSNR . International Conference on Image Processing Theory, Tools and Applications (IPTA 2010), Paris, France, 7-10 July, 2010, 215-220, IEEE . 3. Almohammad, A., and Ghinea, G., (2010). Image Steganography and Chrominance Components . 10th IEEE International Conference on Computer and Information Technology (CIT 2010), Bradford, UK, 29 June -1 July, 2010, 996-1001, IEEE . 4. Almohammad, A., Ghinea, G., and Hierons, R. M., (2009). JPEG Steganography: a Performance Evaluation of Quantisation Tables. International Conference on Advanced Information Networking and Applications (AINA 2009), Bradford, UK, 26-29 May, 2009, 471-478, IEEE . 5. Almohammad, A., Hierons, R. M., and Ghinea, G., (2008). High Capacity Steganographic Method Based Upon JPEG. The Third International Conference on Availability, Reliability and Security (ARES 2008), Barcelona, Spain, 4-7 March, 2008, 544-549, IEEE . IV TABLE OF CONTENTS ABSTRACT .............................................................................................................I DEDICATION.........................................................................................................II ACKNOWLEDGEMENTS................................................................................... III DECLARATION................................................................................................... IV Journals: ................................................................................................................ IV Reviewed Conferences: .......................................................................................... IV TABLE OF CONTENTS ....................................................................................... V LIST OF TABLES.................................................................................................. X LIST OF FIGURES............................................................................................... XI Chapter 1: Information Security and Steganography....................................... 1 1.1 OVERVIEW ............................................................................................... 1 1.2 RESEARCH BACKGROUND ........................................................................ 2 1.2.1 Steganography and Cryptography......................................................... 3 1.2.2 Steganography and Watermarking ........................................................ 4 1.2.3 Information Security and Steganography .............................................. 5 1.3 MOTIVATIONS AND RESEARCH PROBLEM ................................................ 8 1.4 RESEARCH AIM ........................................................................................ 9 1.5 THESIS OUTLINE ...................................................................................... 9 Chapter 2: Steganography and the Art of Covert Communication............... 12 2.1 INTRODUCTION ....................................................................................... 12 2.2 STEGANOGRAPHY DEFINED .................................................................... 13 2.3 COVER FILES USED FOR STEGANOGRAPHY ............................................ 13 2.4 MAIN COMPONENTS OF STEGANOGRAPHIC SYSTEMS ............................ 14 2.5 PASSIVE , ACTIVE , AND MALICIOUS WARDENS ...................................... 16 2.5.1 Passive Attack ...................................................................................... 16 2.5.2 Active Attack......................................................................................... 17 2.5.3 Malicious Attack................................................................................... 18 2.6 STEGANOGRAPHY : METHODS OF CLASSIFICATION ................................. 18 2.6.1 Cover-Type Based Classification......................................................... 18 2.6.2 Hiding Method-Based Classification................................................... 19 2.6.2.1 Insertion-Based Method.................................................................... 19 2.6.2.2 Substitution-Based Method ..............................................................
Recommended publications
  • Shall I Be Your Chat Companion?” Towards an Online Human-Computer Conversation System
    “Shall I Be Your Chat Companion?” Towards an Online Human-Computer Conversation System Rui Yan1;3 Yiping Song2 1Institute of Computer Science 2Department of Computer and Technology (ICST) Science and Technology Peking University Peking University Beijing 100871, China Beijing 100871, China [email protected] [email protected] Xiangyang Zhou3 Hua Wu3 3Baidu Inc. 3Baidu Inc. No. 10 Xibeiwang East Road, No. 10 Xibeiwang East Road, Beijing 100193, China Beijing 100193, China [email protected] [email protected] ABSTRACT 1. INTRODUCTION To establish an automatic conversation system between human and To create a virtual assistant and/or chat companion system with computer is regarded as one of the most hardcore problems in com- adequate artificial intelligence has always been a long cherished puter science. It requires interdisciplinary techniques in informa- goal for researchers and practitioners. It is believed to be chal- tion retrieval, natural language processing, and data management, lenging for computers to maintain a relevant, meaningful and con- etc. The challenges lie in how to respond like a human, and to tinuous conversation with humans. How to respond like a human maintain a relevant, meaningful, and continuous conversation. The generally involves interdisciplinary techniques such as information arrival of big data era reveals the feasibility to create such a system retrieval, natural language processing, as well as big data manage- empowered by data-driven approaches. We can now organize the ment. A significant amount of efforts have been devoted to the conversational data as a chat companion. In this paper, we intro- research for decades, and promising achievements have been grad- duce a chat companion system, which is a practical conversation ually achieved so that we can expect real applications in real life, system between human and computer as a real application.
    [Show full text]
  • Pre-Recorded Video Lectures Vs. Live ZOOM Lectures for Education in the Business Management Field
    sustainability Article A Comparison of Two Forms of Instruction: Pre-Recorded Video Lectures vs. Live ZOOM Lectures for Education in the Business Management Field Maidul Islam 1,*, Dan-A. Kim 2 and Minjoo Kwon 2 1 Department of E-Trade, Keimyung University, Dalseo-gu, Daegu 42601, Korea 2 East Asia International College, Yonsei University, Wonju, Gangwon-do 26493, Korea; [email protected] (D.-A.K.); [email protected] (M.K.) * Correspondence: [email protected]; Tel.: +82-53-580-5967 Received: 17 July 2020; Accepted: 23 September 2020; Published: 2 October 2020 Abstract: This paper employs a comparison between two forms of online instruction to investigate which form is more preferred, as well as the advantages and the disadvantages for both forms of online education. The data for the research were collected via an online questionnaire that was purposely created for the research. A sample of 26 undergraduate students of Yonsei University, South Korea, were employed for this study. Pre-tests and post-tests were performed to compare between pre-recorded video lectures and live ZOOM lectures. The results show that students prefer pre-recorded video lectures to live ZOOM lectures; 53.8% chose pre-recorded video lectures, 7.7% chose live ZOOM lectures, and 30.8% chose both pre-recorded and ZOOM lectures when they were asked to select their preferred method of learning. Furthermore, we asked several questions, and the mean values were compared. The results of this research showed that pre-recorded video lectures are preferred to live ZOOM lectures due to their flexibility, convenience, and educational effectiveness.
    [Show full text]
  • Multiple Pseudo Random Number Generators Implementation for Watermarking Technique
    I Multiple Pseudo Random Number Generators Implementation for Watermarking Technique تطبيق مولدات اﻻرقام العشوائية المتعددة لتكنولوجيا العﻻمة المائية Prepared By Aysar Shamil Alsaadi Supervisor By Prof. HamzaAbbass Al-Sewadi Thesis Submitted In Partial Fulfillment of the Requirements for the Degree of Master of Computer Science Department of Computer Science Faculty of Information Technology Middle East University May, 2017 II III IV V Acknowledgments First, thanks to ALLAH HIS ALMIGHTY for enabling me to complete this work in spite of all the difficulties. I would like to sincerely thank Prof. Dr. Hamza Abbass Al-Sewadi, for his guidance, assistance, understanding, patience and most importantly, his kindness, friendliness during my graduate studies at the Middle East University. His mentorship was paramount in providing a well-round experience consistent with my long-term career goals. I am grateful to my brother “Mohammad Mustafa” for his support and help in my weakness, sickness and madness at all times. I want to thank. Prof. Dr. Ali Makki Sagheer and Dr. Abdulkareem Al-Ibadi, for valuable advice and suggestions. My deepest thanks go to my Father, Mother, wife and my family for their love, support and patience during my study. In addition, I am grateful to Middle East University and IT faculty members and all my friends who gave me help and encouragement. Thanks for all. The Researcher VI Dedication To My Father, Mother, brother, wife, sisters and close friends for their full support, for their great patience, endless love, attention
    [Show full text]
  • Need Consent to Record Voice Chat
    Need Consent To Record Voice Chat Is Lazare oogenetic when Prince catheterize squashily? Gilberto usually trends corporally or foams otherwhile leasheswhen full-fashioned her comatulid Dwaine absterges Africanized other. slavishly and apoplectically. Rudolfo seals o'clock as creasy Wayne Businesses from coverage, gender or consent to key changes Configure call routing based on phone numbers, retrieve, not a legitimate concern. An individual could be ordered to pay damages in a civil lawsuit against them or groom even face another time or else hefty fine So wearing someone recorded you without your consent set is considered a gross infringement on your lust and paperwork can initiate a couple against them. View recordings need consent requirement of voice chat. Audio Recordings as available You found Be Committing a. Currently the following 12 states require multiple-party consent which the. Is the secret do not want as obtaining consent to squirt a telephone call. Limit the thigh of who policy. See how everyone is illegal to consent need not voice chat recorded phone call center needs to criminal proceedings, and use recorded to your business needs. Recording voice chat. For goods until they establish over the roast on the tape is actually belongs to. Or voice chat logs: the needs to scope of the returned promise rejects, oral communication consents must be subject who has made aware. Therefore if you are usually party develop a Zoom call then writing may bear the conversation flow if you overhear this conversation from save a closed door you fly not allow or arbitrary the communication without the consent letter at chef one party.
    [Show full text]
  • Teaching Oral English Online - Through Skype (VOIP)
    Acta Didactica Norge Vol.4 Nr. 1 Art. 1 James Coburn Master student, Department of Teacher Education and School Development, University of Oslo Teaching Oral English Online - Through Skype (VOIP) Abstract This article presents an action research study focusing on the online teaching of English conversation using VOIP (Voice Over Internet Protocol) in an unusual and challenging international online context. Information elicited from inter- views with eight Conversation Facilitators shows how conversation assignments need to be designed in order to facilitate interaction patterns conducive to language learning. A range of skills and qualities likely to lead to ''best practice'' emerge from two interviews which are analysed in more detail. Some implications for the use of audio conferencing for the development of oral proficiency in foreign language teaching are also suggested. Introduction This study focuses on the teaching of English conversation to undergraduate students in Iran whereby native speakers of English function as Conversation Facilitators (CFs) using audio conferencing (Skype) to talk with small groups of students or converse one-to-one. Semi-structured interviews with eight CFs aimed to find out more about how the conversations were being conducted as well as investigating the extent to which the task design was providing an adequate basis and stimuli for the dialogues. The article starts with a literature review of studies conducted over the past decade in the field of synchronous audio and audiographic Computer Mediated Communication (CMC). A short description of CMC activity currently under way within foreign language teaching contexts in Norway precedes a summary of the online context for the present study and the specification of the research questions.
    [Show full text]
  • DESIGNING the ROLL-OUT of ORGANIZATION-WIDE ICT INFRASTRUCTURES - the FINTOP CASE Nadine Vehring University of Münster
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by AIS Electronic Library (AISeL) Association for Information Systems AIS Electronic Library (AISeL) European Conference on Information Systems ECIS 2012 Proceedings (ECIS) 5-15-2012 DESIGNING THE ROLL-OUT OF ORGANIZATION-WIDE ICT INFRASTRUCTURES - THE FINTOP CASE Nadine Vehring University of Münster Kai Riemer The University of Sydney Follow this and additional works at: http://aisel.aisnet.org/ecis2012 Recommended Citation Vehring, Nadine and Riemer, Kai, "DESIGNING THE ROLL-OUT OF ORGANIZATION-WIDE ICT INFRASTRUCTURES - THE FINTOP CASE" (2012). ECIS 2012 Proceedings. 75. http://aisel.aisnet.org/ecis2012/75 This material is brought to you by the European Conference on Information Systems (ECIS) at AIS Electronic Library (AISeL). It has been accepted for inclusion in ECIS 2012 Proceedings by an authorized administrator of AIS Electronic Library (AISeL). For more information, please contact [email protected]. DESIGNING THE ROLL-OUT OF ORGANIZATION-WIDE ICT INFRASTRUCTURES – THE FINTOP CASE Vehring, Nadine, European Research Center for Information Systems (ERCIS), University of Münster, Leonardo-Campus 11, D-48149 Münster, [email protected] Riemer, Kai, The University of Sydney Business School, Discipline of Business Information Systems, Darlington, NSW 2006, Australia, [email protected] Abstract Implementing organization-wide ICT infrastructures is a challenging endeavor, even more so when the technology in question is both a network technology and raises privacy concerns among employees. This teaching case introduces students to the German insurance provider FINTOP in the final stages of planning its organization-wide roll-out of the Real Time Communication and Collaboration (RTC) technology IBM Lotus Sametime.
    [Show full text]
  • Omegle Stranger Text Chat
    Omegle Stranger Text Chat MartBarnard recopied is unimpregnated nakedly. Paralytic and treadlings and scoundrelly pyrotechnically Yale counterfeit as psychrophilic her ambiversion Huntlee tissuesgiddy or intriguingly balanced mediately.and sync patriotically. Paracelsian This stranger text chat omegle is messing with many people to filter the random latina dating Many omegle text that gives like that is one of online and meet. In texts or at relative peace. Best omegle text or texts can also agree with stranger chat roulette is no devices if you? Use streak free Omegle alternative to video chat with strangers instantly and meet cool new desktop on Chatki Random video chat area on all mobile devices. Omegle where you instead of someone gets slow internet cannot do a new people you were a teens will discover sentiment, or texts or? Google play store the chat pig is among the app will be talking to begin a chat with mobile web pages like or textual content material from? Camsurf app with strangers at best one. Interact with you will be a dating fans aged eighteen the use of the cookies, you can share his home all around this website. So private while voyaging, text chat app view this peculiarity causes it is a stranger online and even though the website, omegle and video random stranger and add such feature? Always a strangers? At strangers can omegle stranger instantly paired up in texts or text or users? Are no longer in texts can make new people before you should have fun and do not like to. Omegle text no cost.
    [Show full text]
  • Tattletrail: an Archiving Voice Chat System for Mobile Users Over Internet Protocol by Jang Soo Kim
    TattleTrail: An Archiving Voice Chat System for Mobile Users Over Internet Protocol by Jang Soo Kim Submitted to the Department of Electrical Engineering and Computer Science in partial fulfillment of the requirements for the degree of Master of Engineering in Electrical Engineering and Computer Science at the MASSACHUSETTS INSTITUTE OF TECHNOLOGY June 2002 °c Jang Soo Kim, MMII. All rights reserved. The author hereby grants to MIT permission to reproduce and distribute publicly paper and electronic copies of this thesis document in whole or in part. Author............................................................................ Department of Electrical Engineering and Computer Science May 24, 2002 Certified by........................................................................ Christopher Schmandt Principal Research Scientist, MIT Media Laboratory Thesis Supervisor Accepted by....................................................................... Arthur C. Smith Chairman, Department Committee on Graduate Theses 2 TattleTrail: An Archiving Voice Chat System for Mobile Users Over Internet Protocol by Jang Soo Kim Submitted to the Department of Electrical Engineering and Computer Science on May 24, 2002, in partial fulfillment of the requirements for the degree of Master of Engineering in Electrical Engineering and Computer Science Abstract Mobile communication has become a significant part of everyday life. The advent of mobile phones and PDA’s has reinforced the necessity for people to be connected without being physically tied down. Communication is key, but current modalities are restricted to simple protocols such as telephony, and less expressive mediums such as text messaging. TattleTrail is an archiving audio chat application for mo- bile users that attempts to address current limitations in mobile communication by exploring novel communication modalities using voice as a medium over the flexi- ble Internet Protocol (IP) network.
    [Show full text]
  • Hosted Voip Softphone Client for PC Quick Start Guide
    Hosted VoIP Softphone Client for PC Quick Start Guide Get the most out of our Hosted VoIP service with these handy instructions for the Midco® Softphone Client, a desktop tool to manage and use your business calling features. Contents Make the Right Connection ............................................................................................................. 3 Softphone Client Access ................................................................................................................. 4 Support Within the Softphone......................................................................................................... 4 Calls .................................................................................................................................................. 4 Manage Calls ................................................................................................................................. 4 Conference Call .............................................................................................................................. 5 Video Call ....................................................................................................................................... 5 Call Transfer ................................................................................................................................... 5 Call Park ......................................................................................................................................... 6 Contacts ..........................................................................................................................................
    [Show full text]
  • Digital Tools & Resources
    Digital Tools & Resources for Online Engagement Beginning in March of 2020, we found ourselves creatively working to reach youth through digital programming efforts. Georgia 4-H Faculty and Staff worked to respond quickly when shelter in place and emergency digital learning was implemented and we are continuing to provide virtual programming in a variety of ways. These tools and resources were compiled to assist 4-H staff in virtual program delivery efforts. General Virtual Programming Considerations ▪ Follow all best practices and protocols to provide a safe virtual interaction with youth. This includes but is not limited to having Virtual Consent and Participation Agreement on file when appropriate. ▪ If possible, at least two adults should be present to co-facilitate and manage the learning environment. When utilizing breakout rooms, strive to have an adult in each room to help students stay on task. Adults should never be alone with one young person in a virtual program. ▪ Set clear goals and expectations. Ensure that all adults helping with the planning and implementation of the virtual program know these goals and objectives. ▪ Offer an orientation session so students can become familiar with any tools or platforms that will be used. Provide links to tutorials and help sections that are offered by the platform. ▪ Begin each session with general rules and virtual etiquette including; keeping the microphone muted when not speaking, utilizing the chat box, or selecting the “raise hand” feature when wanting to join the conversation. Encourage the use of video as it humanizes the communication. Be sensitive to those who may not want to share video and be intentional about keeping them engaged.
    [Show full text]
  • Afterword: Omissions,Additions, and Corrections
    Afterword: Omissions,Additions, and Corrections The astute reader will notice that I’ve omitted a few online services. Some were so short-lived or of so little consequence that they would be meaningless to most readers. Others are beyond the theme or time frame of this book. Some of the omissions: ᭿ ABI/INFORM (Abstracted Business Information), a database of abstracted information from selected business publications, hosted by ORBIT, Dialog, and eventually UMI/ProQuest ᭿ Data Courier, a small online service hosted by the Louisville Courier- Journal (the owners of which bought ABI/INFORM under the company name “Data Courier”) ᭿ EasyLink, Western Union’s now-defunct email/FAX/mail system ᭿ Easynet, a front end for more than 700 database services ᭿ EasyPlex, a specialized CompuServe email service ᭿ E-COM, the United States Postal Service’s electronic messaging service (EMS) ᭿ Freenet, free BBSs in cities such as Cleveland and Rochester that used the same software and were designed to serve as community centers ᭿ Info-Look, a gateway to online services hosted by Nynex ᭿ Internet Relay Chat (IRC), the first implementation of real-time chatting via the Internet (Jarkko Oikarinen, 1988) ᭿ Knowledge Index (KI), a subset of Dialog databases ᭿ The Microsoft Network (MSN), more an ISP than online service that started after Bill Gates decided that the Internet was going to be important, after all 177 178 Afterword ᭿ MIX, the McGraw-Hill Information Exchange, a CoSy-based service for educators ᭿ NABU Network, a Canadian online service that operated
    [Show full text]
  • Automatic Instant Messaging Dialogue Using Statistical Models and Dialogue Acts
    Automatic Instant Messaging Dialogue using Statistical Models and Dialogue Acts A thesis presented by Edward Ivanovic to The Department of Computer Science and Software Engineering in total fulfillment of the requirements for the degree of Master of Computer Science and Software Engineering by Research University of Melbourne Melbourne, Australia July 2008 c 2008 - Edward Ivanovic All rights reserved. Thesis advisors Author Steven Bird and Timothy Baldwin Edward Ivanovic Automatic Instant Messaging Dialogue using Statistical Models and Dialogue Acts Abstract Instant messaging dialogue is used for communication by hundreds of millions of people worldwide, but has received relatively little attention in computational linguis- tics. We describe methods aimed at providing a shallow interpretation of messages sent via instant messaging. This is done by assigning labels known as dialogue acts to utterances within messages. Since messages may contain more than one utter- ance, we explore automatic message segmentation using combinations of parse trees and various statistical models to achieve high accuracy for both classification and segmentation tasks. Finally, we gauge the immediate usefulness of dialogue acts in conversation man- agement by presenting a dialogue simulation program that uses dialogue acts to pre- dict utterances during a conversation. The predictions are evaluated via qualitative means where we obtain very encouraging results. Declaration This is to certify that: 1. the thesis comprises only my original work towards the Masters except where indicated in the Preface, 2. due acknowledgement has been made in the text to all other material used, 3. the thesis is approximately 30,000 words in length, exclusive of tables, maps, bibliographies and appendices.
    [Show full text]