Perspective steganographic solutions and their application

Authors: S. Toliupa, A. Romanova
Affiliation: Taras Shevchenko National University of Kyiv, the Faculty of Information Technology, Information Security Management

Category:

Keywords: applications. cryptography. security. Stenography
ABSTRACT. Nowadays, as the role of information technologies in our lives is growing and growing with every passing minute, there is no question about the fact that information security measures are an issue of the highest importance. It would not be wrong to say that there is no ‘zero-day threat’ anymore; it is more like ‘a threat of a zero second’. Every modern technology automatically causes several new vulnerabilities and threats to come to existence, which, on its part, makes security specialists work their best to counter such efforts. Thus, there are quite a lot of information security solutions at hand already. Cryptography is doubtlessly one of the most effective, developed and approbated methods to be used when it comes to the protection of information resources. Nevertheless, it might be more effective to hide the communication channel itself instead of making unreadable the information within it. The practice of concealing data within text- or media-file is called steganography and has its roots deep in the history of the humankind. A considerable number of steganographic methods are well-known and implemented in various steganosystems and applications. There are some methods of information concealment, though, that receive the attention not so much. The reasons of such lack of popularity can differ depending on specific solutions: their complexity for one, low cost-effectiveness of their realization for another. In any instance, they are either poorly described or are not widely used regardless of their perspectiveness. The purpose of this article is to conduct an analysis and suggest possible practical use of steganographic solutions that are known and can be applied to a variety of information security systems, and yet lack either theoretical basis or practical application.

References:

ALEXANDRE MIGUEL FERREIRA: An Overview on Hiding and Detecting Stegodata in Video Streams. University of Amsterdam, System & Network Engineering – Research Project II, March 23 2015
KONAKHOVICH G. F., PUZYRENKO A. YU.: Computer steganography. Theory and practice with Mathcad (Rus). MK-Press Kyiv, Ukraine 2006
FRIDRICH, JESSICA, M. GOLJAN, D. SOUKAL: Searching for the Stego Key. Proc. SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VI 2004 (pdf): http://www.ws.binghamton.edu/fridrich/Research/Keysearch_SPIE.pdf.
CHRISTOPHER LEAGUE: An overview of digital steganography, particularly within images, for the computationally curious. Long Island University 2015: https://www.youtube.com/watch?v=-7FBPgQDX5o
Secret Code in Color Printers Lets Government Track You; Tiny Dots Show Where and When You Made Your Print. Electronic Frontier Foundation October 2005: https://www.eff.org/press/archives/2005/10/16
Echo Data Hiding (html): http://www.slidefinder.net/a/audio_steganography_echo_data_hiding/24367218
AKBAS E. ALI: A New Text Steganography Method by Using Non-Printing Unicode Characters. Eng& Tech. Journal, 28 (1) 2010 (pdf): http://www.uotechnology.edu.iq/tec_ magaz/volume282010/No.1.2010-/researches/Text%287%29.pdf
Cyber-Physical system: https://en.wikipedia.org/wiki/Cyber-physical_system
STEVEN J. MURDOCH, STEPHEN LEWIS: Embedding Covert Channels into TCP/IP. University of Cambridge, Computer Laboratory (pdf): http://www.cl.cam.ac.uk/users/fsjm217, srl32g/
CARTER BANCROFT, PH.D.: DNA-Based Technologies: Computation, Steganography, Nanotechnology. Talk at Material Science and Engineering, Stony Brook University, April 2011.
ADITIT SHARMA: Security and Information Hiding based on DNA Steganography. International Journal of Computer Science and Mobile Computing, Vol. 5, March 2016: www.ijcsmc.com
ASHISH GEHANI, THOMAS H. LABEAN, JOHN H. REIF: DNA-based Cryptography. DIMACS Series in Discrete Mathematics and Theoretical Computer Science, Volume 54, 2000 (pdf)
TOMONORI KAWANO: Run-length encoding graphic rules, biochemically editable designs and steganographical numeric data embedment for DNA-based cryptographical coding system. Commun Inteqr Biol. March 2013: https://www.ncbi.nlm.nih.gov/pmc/articles/PMC3609851/
WENDELL M. SMITH: DNA Steganography for Security Marking. 5th World Product and Image Security Convention, PISEC ’03, Czech Republic. Technology Transfer Group: http://www.polestarltd.com/ttg/isspeeches/pisec03/index.html