Pictographic steganography based on social networking websites
Abstract
Steganography is the art of communication that does not let a third party know that the communication channel exists. It has always been influenced by the way people communicate and with the explosion of social networking websites, it is likely that these will be used as channels to cover the very existence of communication between different entities. In this paper, we present a new effective pictographic steganographic channel. We make use of the huge amount of photos available online as communication channels. We are exploiting the ubiquitousness of those social networking platforms to propel a powerful and pragmatic protocol. Our novel scheme exploiting social networking websites is robust against active and malicious.
Keywords
Full Text:
PDFReferences
Myres, John Linton. Herodotus, father of history. Clarendon Press, 1953.
Waterfield, Robin, and C. Dewald. "Herodotus: The Histories." Herodotus:(translation (1998).
Sumathi, C. P., T. Santanam, and G. Umamaheswari. "A Study of Various Steganographic Techniques Used for Information Hiding." arXiv preprint arXiv:1401.5561 (2014).
Kawaguchi, Eiji, and Richard O. Eason. "Principles and applications of BPCS steganography." Photonics East (ISAM, VVDC, IEMB). International Society for Optics and Photonics, 1999.
Anderson, Ross J., and Fabien AP Petitcolas. "On the limits of steganography." Selected Areas in Communications, IEEE Journal on 16.4 (1998): 474-481.
Westfeld, Andreas, and Andreas Pfitzmann. "Attacks on steganographic systems." Information Hiding. Springer Berlin Heidelberg, 2000. APA
Provos, Niels. "Defending Against Statistical Steganalysis." Usenix security symposium. Vol. 10. 2001.
Facebook Help Center. 2015. Basic Privacy Settings & Tools. Retrieved April 12, 2015 from https://www.facebook.com/help/325807937506242/
Özera Hamza, Avcıba Ismail, Sankura Bülent and Memonc Nasir. 2010. Steganalysis of Audio based on Audio Quality Metrics.
Fridrich J. 2009. Steganography in digital media principles algorithms and applications. 1st Ed. Campbridge University Press.
Johnson N.F and Jajodia S. 1998. Exploring steganography: seeing the unseen. IEEE Computer, (pp. 26-34).
Srivastava, Lee A. B., Simoncelli E. P. and Zhu S-C. 2003. On Advances in Statistical Modeling of Natural Images. Journal of Mathematical Imaging and Vision.
Fridrich Jessica, Goljan Miroslav and Du Rui. 2001. Reliable Detection of LSB Steganography in Color and Grayscale Images.
Fridrich and Goljan M. and Du R. 2001. Detecting LSB steganography in color and grayscale images. IEEE Multimedia 8, pp. 22–28.
Nabaee H. and Faez K. 2010. An efficient steganography method based on reducing changes. 25th International Conference of Image and Vision Computing New Zealand (IVCNZ), (pp.1 – 7).
Toony Z., Sajedi H. and Jamzad M. 2009. A high capacity image hiding method based on fuzzy image coding/decoding. Computer Conference, CSICC 2009. 14th International CSI, (pp. 518 – 523).
Sajedi H. and Harif. 2008. Cover Selection Steganography Method Based on Similarity of Image Blocks.
Bohme R. 2010. Advanced Statistical Steganalysis (2010 edition). Springer.
Marincola J. M. 1996. Herodotus: The Histories.
Landau S., Kent S., Brooks C., Charney S., Denning D., Diffie W., Lauck A., Miller D., Neumann P. and Sobel D. 1994. Codes, Keys and Conflicts: Issues in U.S. Crypto Policy. Rep. of a Special Panel of the ACM U.S. Public Policy Committee.
Beaver D. 2008. 10 billion photos. (October 2008). Retrieved April 12, 2015 from
https://www.facebook.com/notes/facebook-engineering/10-billion-photos/30695603919
Fridrich J., Goljan M. and Du R. 2008. Detecting LSB steganography in color, and grayscale images. IEEE Multimedia, vol. 8 no.4, pp. 22 – 28.
Dumitrescu S., Wu X. and Wang Z. 2003. Detection of LSB steganography via sample pair analysis. IEEE Transaction on Signal processing, vol. 51, no. 7, pp. 1995-2007, 220.
Zhang T. and Ping X. 2003. A new approach to reliable detection of LSB steganography in natural images. In Signal processing (Vol. 83, pp. 2085-2093, 2003).
Kerckhoffs A. 1883. La cryptographie militaire (Vol. ser. 9 ). J. des Sciences Militaires.
Nikiforakis N. and Acar G. 2014. Browse at your own risk. Spectrum, IEEE, Volume: 51, Issue: 8 , pp. 30 - 35.
Eckersley P. 2010. How Unique is Your Web Browser? Proceedings of the Privacy Enhancing Technologies Symposium (PETS 2010). pp. 1-18