SMS Blind Steganography by Using Maximum-Minimum Method

Abouzar Zare

Abstract


This paper represents an effective steganography method for the textual data in black and white images used in the pictorial short message service (SMS). Practically, compare with other methods, the steganography capacity increases substantially by changing the selection methodology and the style of blocking as well as the way of storing characters. In order to have bit changes in a block of the cover image, such that the change would not be noticeable by an observer (to be imperceptible), maximum of one-bit change per block is allowed. The introduced maximum-minimum method is based how the required pixel value, which is assumed to be located in the center of the block, is related to the number of the black or white pixels in that block. In fact, only the center pixel value maybe changed in a block. The hidden secret message may be recovered with examining a pixel with its related block; and so, there is no need to have the original image. By comparing it with other methods, our new method offers higher capacity, more efficient imperceptibility, and better security features.

Full Text:

PDF

References


A. Cheddad, J. Condell, K. Curran, P. Mc Kevitt, “Digital image steganography: Survey and analysis of current methodsâ€, Signal Processing 90 (2010) 727–752.

Ingcmar J. Cox, Mattew L. Millet, Jeffrey A. Bloom, Jessica Fridrich, and Tan Kalker, Digital Watermarking and Steganography,2th Ed. The Morgan kaufman publishers, USA, Elsevier, 2008.

A.zare, A.R.Naghshnilchi “Steganography in SMS by New odd-even method†, Proc. of the 16th International CSI Computer Conference (CSICC'2006), School of Computer Science, IPM, Tehran, Iran, 24-26 Jan. 2011, pp.905-910 , (in Persian).

Shirali-Shahreza, M.H., Shirali-Shahreza, M., “Steganography in SMS by Sudoku Puzzleâ€, 978-1-4244-1968-2008 IEEE.

Shirali-Shahreza, M, “Text Steganography by Changing Words Spellingâ€, In 10th International Conference on Advanced Communication Technology, ICACT 08, vol. 3, pp. 1912-1913, 17-20 Feb. 2008

Shirali-Shahreza, M.H., Shirali-Shahreza, M., “Text Steganography in Chatâ€, In 3rd IEEE/IFIP International Conference in Central Asia, pp. 1-5, 26-28 Sept. 2007

M.H. Shirali-Shahreza and M. Shirali-Shahreza, "A New Approach to Persian/Arabic Text Steganography", Proceedings of the 5th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2006), Honolulu, HI, USA, 10-12 July, 2006, pp. 310-315.

M. Shirali-Shahreza, "Steganography in SMS," Proc. of the 11th International CSI Computer Conference (CSICC'2006), School of Computer Science, IPM, Tehran, Iran, 24-26 Jan. 2006, pp.905-910 , (in Persian).

JohnWiley and Sons Ltd, Mobile Messaging Technologies and services SMS,EMS and MMS,2nd Ed. Gwenael Le Roodic,England.,West Sussex Po19 8SQ,2005.

N.F. Johnson, S.C. Katzenbeisser, A survey of steganographic techniques, in: S. Katzenbeisser, F.A.P. Petitcolas (Eds.), Information Hiding Techniques for Steganography and Digital Watermarking, Artech House, Inc., Norwood, 2000.

M. Shirali-Shahreza, "Stealth Steganography in SMS,"Proceedings of the third IEEE and IFIP International Conference on Wireless and Optical Communications Networks (WOCN 2006), 11-13 April, 2006.

M. Wu, E. Tang, and B. Liu, "Data hiding in digital binary image," in IEEE Int. Conf. Multimedia & Expo, New York, 2000.

M. Wu and B. Liu, "Data Hiding in Binary Image for Authentication and Annotation," IEEE Trans. on Multimedia, vol. 6, no. 4, August 2004, pp.528-538.

M. Shirali-Shahreza, "An Improved Method for Steganography on Mobile Phone," WSEAS Transactions on Systems, Vol. 4, Issue 7, July 2005, pp. 955-957.

Westfeld, A., “F5__ A Steganographic Algorithm :High Capacity Despite Better Steganalysisâ€, Proc. 4th Int’l Information Hiding Workshop, Springer-Verlog Vol.2137, Berlin Heidelberg New York ,pp.289-302, 2001.

Provos, N., “Defending Against Statistical Steganalysisâ€, Proc. 10th Usenix Security Symp, Usenix Assoc., pp. 323-335, 2001.

Lee, Y.K. Chen, L.H. “High capacity image steganographic model,†Vision, Image and Signal Processing, IEE Proceedings, Vol 147, 288-294, Jun 2000.

Anderson, R.J, Petitcolas, F.A.P., “On the Limits of Steganographyâ€, IEEE Journal of Selected Areas in Communications, Special Issue on Copyright and privacy Protection, Vol. 16(4), pp. 474-481, May 1998.

Y. C. Tseng, Y. Y. Chen, and H. K. Pan, "A Secure Data Hiding Scheme for Binary Images," IEEE Trans. on Communications, Vol. 50, No. 8, Aug. 2002, pp. 1227-3 1.

Y. Y. Chen, H. K. Pan, and Y. C. Tseng, "A Secure Data Hiding Scheme for Two-Color Images," IEEE Symposium on Computers and Communications, 2000, pp. 750-755.

Y. C. Tseng and H. K. Pan, "Secure and Invisible Data Hiding in 2-Color Images," IEEE INFOCOM, 2001, pp. 887-896.

Rafat K.F., “Enhanced Text Steganography in SMSâ€, 2nd International Conference on Computer, Control and Communication, 18 Feb 2009.

Cole E.,†Hiding in Plain Sight: Steganography and the Art of Covert Communicationâ€, John Wiley, Indianapolis, Indiana, 2003.

Venkatesan M., MeenakshiDevi P., Duraiswamy K., Thiagarajah K., “A New Data Hiding Scheme with Quality Control for Binary Images Using Block Parity†Third International Symposium on Information Assurance and Security, IEEE, 2007.

Chhajed J., Inamdar V., Attar V., “Steganography in Black and White Picture Imagesâ€, Congress on Image and Signal Processing, IEEE, 2008.

Böhme R., “Advanced Statistical Steganalysisâ€, Springer, Verlag Berlin Heidelberg, 2010.

Bender W., Gruhl D., Morimoto N., Lu A., "Techniques for data hiding", IBM Systems Journal, vol. 35, Issues 3&4, 1996, pp. 313-336.

Kim Y., Moon K., Oh I., "A Text Watermarking Algorithm based on Word Classification and Inter-word Space Statistics", Proceedings of the Seventh International Conference on Document Analysis and Recognition (ICDAR’03), 2003, pp. 775–779.

Gutub A., Fattani M., "A Novel Arabic Text Steganography Method Using Letter Points and Extensions", Proceedings of the WASET International Conference on Computer, Information and Systems Science and Engineering (ICCISSE), Vienna, Austria, Vol. 21, 2007, pp. 28-31.

Aabed M.A., Awaideh S.M., Elshafei A.M., GutuA. A. b, “Arabic Diacritics Based Steganographyâ€, Proceedings of the International Conference on Signal Processing and Communications (ICSPC 2007), Dubai, UAE, 2007, pp. 756-759.

Gyankamal J. Chhajed ; Vandana Inamdar ; Vahida Attar, " Steganography in Black and White Picture Images†IEEE Image and Signal Processing, CISP '08. Congress on Sanya, Hainan, China, 27-30 May 2008.

Ajetrao H., Kulkarni P.J., Gaikwad N., “A Novel Scheme of Data Hiding in Binary Imagesâ€, International Conference on Computational Intelligence and Multimedia Applications, IEEE, 2007.

Prem Singh, Rajat Chaudhary and Ambika Agarwal “ A Novel Approach of text Steganography based on null spaces†IOSr Journal of Computer Engineering (IOSRJCE) ISSN:2278-0661 Vol 3, Issue 4 (July – Aug 2012) PP 11-17 www.isorjournals.org

Thamaraiselvan, R., and A. Saradha. "A Novel approach of Hybrid Method of Hiding the Text Information Using Stegnography." IJCER 1, no. 1 (2012).

Zhi-Hui Wang “ Emoticon-Based Text Steganography in Chat†School Of Software Dalian University of Technology Dalian,Lionging China, 978-1-4244-4607-0/09/25.00 ©2009 IEEE wangzhihui

Ahmed khan, “Robust Textual Steganographyâ€, Journal of Science (JOS) ISSN 2324-9854, Vol. 4, No. 4, 2015, Pages: 426-434.

Shunquan Tan , Haojie Zhang , Bin Li , Jiwu Huang. “Pixel-Decimation-Assisted Steganalysis of Synchronize-Embedding-Changes Steganographyâ€, IEEE Transactions on Information Forensics and Security ( Volume: 12, Issue: 7, July 2017 ). Pages: 1658 – 1670.


Refbacks

  • There are currently no refbacks.


Copyright (c) 2018 Journal of Electrical Engineering, Electronics, Control and Computer Science

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.